0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:24 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000009b00)={0x10, 0x0, 0x0, 0x400000}, 0xc) 22:08:24 executing program 1: syz_open_dev$dri(&(0x7f00000000c0), 0x364, 0x40) 22:08:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000200000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:24 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x40049409, r1) 22:08:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1263, r1) 22:08:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:24 executing program 0: shmat(0x0, &(0x7f0000000000/0x3000)=nil, 0x2afc1bc4f0f17f69) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x1, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}}) 22:08:24 executing program 1: pipe2$9p(0x0, 0x8c000) 22:08:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r0, 0x8, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r1, &(0x7f00000017c0), 0x218, 0x0, 0x0) rt_tgsigqueueinfo(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x2c, 0x0, 0x24}) 22:08:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:08:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x5421, 0xffffffffffffffff) 22:08:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r0, 0x8, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r1, &(0x7f00000017c0), 0x218, 0x0, 0x0) rt_tgsigqueueinfo(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x2c, 0x0, 0x24}) 22:08:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d80)={0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f0000002e40)) 22:08:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000140), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000003200)={{0xfffffffd, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x1, 0x1, 0x12, 0x0, 0x0, 0x0, 'syz0\x00', 0x0, 0x0, '\x00', [0x0, 0x4]}) 22:08:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r0, 0x8, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r1, &(0x7f00000017c0), 0x218, 0x0, 0x0) rt_tgsigqueueinfo(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x2c, 0x0, 0x24}) 22:08:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x0, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r3 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:25 executing program 1: add_key$user(&(0x7f0000000200), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='v', 0x1, 0xfffffffffffffffb) 22:08:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x20080) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) 22:08:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, r0, 0x8, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/netlink\x00') preadv(r1, &(0x7f00000017c0), 0x218, 0x0, 0x0) rt_tgsigqueueinfo(r0, 0x0, 0x2a, &(0x7f00000001c0)={0x2c, 0x0, 0x24}) 22:08:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$BLKREPORTZONE(r0, 0x401870c8, 0x0) 22:08:26 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x4000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5421, 0x0) 22:08:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000000)=0x1000, 0x4) 22:08:26 executing program 0: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000140), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xe7) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc0405519, &(0x7f0000003200)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 22:08:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) 22:08:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r4 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x16, 0x0, 0x0) 22:08:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x4b47, 0x0) 22:08:26 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8927, &(0x7f00000001c0)={'wlan0\x00'}) 22:08:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 4: shmat(0x0, &(0x7f0000000000/0x3000)=nil, 0x2afc1bc4f0f17f69) shmat(0x0, &(0x7f0000001000/0x1000)=nil, 0x4000) 22:08:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r4 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 0: openat$drirender128(0xffffffffffffff9c, &(0x7f0000002780), 0x40040, 0x0) 22:08:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8924, &(0x7f00000001c0)={'wlan0\x00'}) 22:08:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x890b, &(0x7f00000001c0)={'wlan0\x00'}) 22:08:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 0: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000300)={0x0, 0x0, 0x1}) 22:08:27 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x125d, 0xffffffffffffffff) 22:08:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, 0x0, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r4 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x40101283, 0xffffffffffffffff) 22:08:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000140), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0xc00455d0, 0x0) 22:08:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={0x0, 0x3, 0xffffffffffffffff, 0x33c}) getpid() mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(0xffffffffffffffff, 0x0, 0x4c000) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) fallocate(r0, 0x38, 0xb656, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40680, 0x5) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x4c081) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8004) ioctl$USBDEVFS_IOCTL(r1, 0x40085511, &(0x7f0000000380)) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, &(0x7f0000000200)) syz_open_dev$usbfs(0x0, 0x77, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) 22:08:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000002c0), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x301, 0xffffffffffffffff) 22:08:27 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0xc0045878) 22:08:27 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f00000012c0)={0x14, 0x4, 0x1, 0x101}, 0x14}}, 0x0) 22:08:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f0000000640)={&(0x7f0000000580), 0xc, &(0x7f0000000600)={0x0}}, 0x0) 22:08:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 1: rt_sigqueueinfo(0x0, 0xf, &(0x7f0000000300)={0x0, 0x0, 0x1}) 22:08:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPTPEER(r0, 0x4b60, 0x0) 22:08:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 0: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATu(r0, &(0x7f00000000c0)={0x64, 0x7d, 0x0, {{0x0, 0x4e, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, '', 0x9, '/dev/bsg\x00', 0x9, '/dev/bsg\x00', 0x9, '/dev/bsg\x00'}, 0x1, '}', 0x0, 0xffffffffffffffff, 0xffffffffffffffff}}, 0x64) 22:08:27 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x89a0, 0x0) 22:08:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:27 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 22:08:27 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x6, 0x0, 0x8000, 0x0, 0x1}, 0x40) 22:08:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8906, 0x0) 22:08:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 22:08:28 executing program 0: syz_open_procfs$userns(0x0, &(0x7f00000028c0)) 22:08:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000140), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000002c0)={{0x9, 0x0, 0x0, 0x0, 'syz0\x00'}}) 22:08:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000140), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0xc4c85513, 0x0) 22:08:28 executing program 0: syz_usb_connect$cdc_ncm(0x0, 0x92, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x6d, 0x0, 0x0, 0x3f}, {0x6, 0x24, 0x1a, 0x4, 0x26}, [@network_terminal={0x7, 0x24, 0xa, 0x0, 0x81, 0x20, 0x81}, @country_functional={0xa, 0x24, 0x7, 0x3, 0x4, [0x49, 0x0]}, @network_terminal={0x7, 0x24, 0xa, 0x1, 0x0, 0xaa, 0x6}, @country_functional={0xc, 0x24, 0x7, 0x0, 0x0, [0x0, 0x0, 0x0]}]}, {{0x9, 0x5, 0x81, 0x3, 0x0, 0x3, 0x9}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400, 0x8d, 0x0, 0x7f}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x3, 0x0, 0x6}}}}}}}]}}, 0x0) 22:08:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 1: syz_usb_connect$cdc_ncm(0x0, 0x75, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x63, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@network_terminal={0x7}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x0, 0xa3}}}}}}}]}}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x4, [{0x4, &(0x7f00000003c0)=@lang_id={0x4}}, {0x0, 0x0}, {0x0, 0x0}, {0x4, &(0x7f0000000580)=@lang_id={0x4}}]}) 22:08:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x400}}}}}}}]}}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x2, &(0x7f0000000440)=@string={0x2}}]}) 22:08:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 468.697083][ T3673] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 468.704764][ T1140] usb 1-1: new high-speed USB device number 18 using dummy_hcd 22:08:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 468.847336][ T3682] usb 5-1: new high-speed USB device number 6 using dummy_hcd 22:08:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 469.117561][ T1140] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 469.127461][ T3673] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 469.148433][ T1140] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 469.165238][ T3673] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 469.227793][ T3682] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 469.232354][ T1140] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1024 [ 469.254181][ T3682] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 469.256045][ T3673] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 469.301202][ T3682] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 469.330366][ T3673] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 469.350219][ T3673] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1024 [ 469.353971][ T3682] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 469.384018][ T3682] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1024 [ 469.442141][ T3682] usb 5-1: language id specifier not provided by device, defaulting to English [ 469.507630][ T1140] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 469.517818][ T1140] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 469.536697][ T1140] usb 1-1: Product: syz [ 469.574953][ T1140] usb 1-1: Manufacturer: syz [ 469.587490][ T3682] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 469.593045][ T1140] usb 1-1: SerialNumber: syz [ 469.596555][ T3682] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 469.596584][ T3682] usb 5-1: Product: syz [ 469.596603][ T3682] usb 5-1: Manufacturer: syz [ 469.624058][ T3682] usb 5-1: SerialNumber: syz [ 469.907453][ T3682] cdc_ncm 5-1:1.0: bind() failure [ 469.917366][ T1140] cdc_ncm 1-1:1.0: bind() failure [ 469.941448][ T3682] cdc_ncm 5-1:1.1: CDC Union missing and no IAD found [ 469.952938][ T3682] cdc_ncm 5-1:1.1: bind() failure [ 469.971770][ T3682] usb 5-1: USB disconnect, device number 6 [ 470.003994][ T1140] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 470.027351][ T3673] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 470.043501][ T1140] cdc_ncm 1-1:1.1: bind() failure [ 470.053035][ T3673] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 470.100819][ T1140] usb 1-1: USB disconnect, device number 18 22:08:30 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x4, {{0x5}, {0x5}, {0xd}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x0, 0x15, 0xc0}}, {{0x9, 0x5, 0x3, 0x2, 0x60, 0x3f, 0x5}}}}}]}}]}}, &(0x7f0000000300)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x201, 0x0, 0x9, 0x80, 0x20}, 0x5, &(0x7f0000000180)={0x5, 0xf, 0x5}, 0x5, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x81a}}, {0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0xc07}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x3409}}, {0x0, 0x0}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x812}}]}) 22:08:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 470.407369][ T3673] cdc_ncm 2-1:1.0: bind() failure [ 470.415815][ T3673] cdc_ncm 2-1:1.1: CDC Union missing and no IAD found [ 470.459408][ T3673] cdc_ncm 2-1:1.1: bind() failure [ 470.514914][ T3673] usb 2-1: USB disconnect, device number 5 [ 470.767132][ T3682] usb 1-1: new high-speed USB device number 19 using dummy_hcd 22:08:30 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x54, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x42, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@dmm={0x7}]}}}]}}]}}, 0x0) 22:08:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:30 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000280)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{}, {{0x9, 0x5, 0x3, 0x2, 0x400}}}}}}}]}}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f00000003c0)=@lang_id={0x4}}, {0x2, &(0x7f0000000440)=@string={0x2}}]}) 22:08:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{0x0}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 471.137326][ T3682] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 471.217099][ T140] usb 5-1: new high-speed USB device number 7 using dummy_hcd 22:08:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, 0x0, 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r4 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 471.357772][ T1140] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 471.527412][ T3682] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 471.536589][ T3682] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 471.560544][ T3682] usb 1-1: Product: 㐉 [ 471.564855][ T3682] usb 1-1: Manufacturer: ఇ [ 471.597462][T11232] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 471.617280][ T140] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 471.631867][ T140] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 471.642162][ T140] usb 5-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 471.652078][ T140] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 0 [ 471.661926][ T140] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 1024 [ 471.737271][ T1140] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 471.857537][ T140] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 471.866740][ T140] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 471.875838][ T3682] cdc_ether: probe of 1-1:1.0 failed with error -22 [ 471.895976][ T3682] usb 1-1: USB disconnect, device number 19 [ 471.907306][ T1140] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 471.907912][ T140] usb 5-1: Product: syz [ 471.922969][ T1140] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 471.925448][ T140] usb 5-1: SerialNumber: syz [ 471.945349][ T1140] usb 2-1: Product: syz [ 471.950893][ T1140] usb 2-1: Manufacturer: syz [ 471.956116][ T1140] usb 2-1: SerialNumber: syz [ 472.012298][ T1140] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 472.212957][ T3682] usb 2-1: USB disconnect, device number 6 [ 472.219094][ T140] cdc_ncm 5-1:1.0: bind() failure [ 472.228416][ T140] cdc_ncm 5-1:1.1: CDC Union missing and no IAD found [ 472.239962][ T140] cdc_ncm 5-1:1.1: bind() failure [ 472.253049][ T140] usb 5-1: USB disconnect, device number 7 22:08:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89b1, &(0x7f0000006980)={'ip6tnl0\x00', 0x0}) 22:08:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:32 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f00000001c0)=@lang_id={0x4}}, {0x4, &(0x7f0000000200)=@lang_id={0x4}}]}) 22:08:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, 0x0, 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r4 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:32 executing program 0: syz_open_dev$dri(&(0x7f00000000c0), 0x6, 0x10d600) 22:08:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x19, 0x0, 0x0, 0x8001, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 22:08:32 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x56, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x44, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x1, 0x7, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x0, 0x40}}, {[{{0x9, 0x5, 0x81, 0x3, 0x208, 0x0, 0x0, 0x8}}], {{0x9, 0x5, 0x82, 0x2, 0x808}}, {{0x9, 0x5, 0x3, 0x2, 0x60}}}}}]}}]}}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x0, 0x0}, {0x0, 0x0}]}) 22:08:32 executing program 4: syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000280)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}}}}]}}, 0x0) 22:08:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, 0x0, 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r4 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 473.107865][ T140] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 473.219665][ T3682] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 473.227094][ T1140] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 473.487272][ T140] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 473.587260][ T3682] usb 1-1: config 1 interface 0 altsetting 1 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 473.598428][ T3682] usb 1-1: config 1 interface 0 altsetting 1 endpoint 0x82 has invalid maxpacket 2056, setting to 1024 [ 473.609717][ T3682] usb 1-1: config 1 interface 0 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 473.617587][ T1140] usb 5-1: unable to get BOS descriptor or descriptor too short [ 473.620150][ T3682] usb 1-1: config 1 interface 0 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 96 [ 473.637440][ T3682] usb 1-1: config 1 interface 0 altsetting 1 has 3 endpoint descriptors, different from the interface descriptor's value: 7 [ 473.650587][ T3682] usb 1-1: config 1 interface 0 has no altsetting 0 [ 473.657659][ T140] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 473.666721][ T140] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 473.675775][ T140] usb 2-1: Product: syz [ 473.680324][ T140] usb 2-1: SerialNumber: syz [ 473.717159][ T1140] usb 5-1: unable to read config index 0 descriptor/start: -71 [ 473.725174][ T1140] usb 5-1: can't read configurations, error -71 [ 473.738092][ T140] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 473.908086][ T3682] usb 1-1: string descriptor 0 read error: -22 [ 473.914324][ T3682] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 473.924221][ T3682] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 473.943206][ T3673] usb 2-1: USB disconnect, device number 7 [ 473.947535][T11275] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 473.956164][T11275] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 474.187176][ T3682] cdc_ether: probe of 1-1:1.0 failed with error -71 [ 474.197454][ T3682] usb 1-1: USB disconnect, device number 20 22:08:34 executing program 1: syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f00000001c0)=@lang_id={0x4}}, {0x4, &(0x7f0000000200)=@lang_id={0x4}}]}) 22:08:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:34 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f0000000300)) 22:08:34 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000540), 0x5, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e256cdc4"}, 0x0, 0x0, @planes=0x0}) 22:08:34 executing program 0: openat$uhid(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 22:08:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:34 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x24}}, 0x0) 22:08:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c00000000000000010000000200", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 474.857178][ T3673] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 475.267333][ T3673] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 475.447261][ T3673] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 475.456423][ T3673] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 475.464729][ T3673] usb 2-1: Product: syz [ 475.469074][ T3673] usb 2-1: SerialNumber: syz [ 475.521576][ T3673] cdc_ether: probe of 2-1:1.0 failed with error -22 [ 475.737314][ T3673] usb 2-1: USB disconnect, device number 8 22:08:36 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={[0x3]}, 0x8}) 22:08:36 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$IOCTL_VMCI_SET_NOTIFY(r1, 0x5761, 0x0) 22:08:36 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) 22:08:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:36 executing program 4: select(0x40, &(0x7f0000000200)={0x10000}, &(0x7f0000000240)={0x10001}, &(0x7f0000000280)={0x4}, &(0x7f00000002c0)) 22:08:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x5421, &(0x7f0000006980)={'ip6tnl0\x00', 0x0}) 22:08:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:36 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$adfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000001100)=[{0x0, 0x0, 0x4}], 0x59fdf40ac0ccff10, &(0x7f0000001180)={[{'\x05\x80Jw\x16;#\xf4\x92\x8a\xd3D\xb5\xa8\xd2\xc5S\x8a\x0f*\xf1\x10\x8a(\xfb\xc0\x88\x91\xf6Mv\x00\x005\xb9\xccU\x8c\x03\x00\x00\x00\x00\x00\x00\x00\xaf\xd6\nY?n\x83ln\x13\x13>\x0f+\bHhE\xab\x9e\xc7h\xedhS\x89\xbd\x1bX\x82l\x85\xd6:m[\xd2\x9dM\xb7\x86\xa8\xc8\x9a\xe5\xfex\xc41\x00\x00\x00\x00\x00\x00\x00'}, {'\x00'}, {'\x00'}], [{@obj_type={'obj_type', 0x3d, '\\!--,'}}, {@measure}, {@obj_user={'obj_user', 0x3d, '\x00'}}]}) 22:08:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x5421, &(0x7f0000001fc0)={'tunl0\x00', 0x0}) 22:08:37 executing program 0: ioprio_set$pid(0x0, 0x0, 0x7) 22:08:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, "995071d46508303a1f7fbfd74e80a5eee11e18acf71303f6898127304c1f36412184bfeaa7edcc3041dc3c7d1f561629840e0fa4873e90acada67ebde5e412e5eebe0a799059c83a9039b2086bf0e921"}, 0xd8) 22:08:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000020000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) 22:08:37 executing program 4: syz_open_dev$MSR(&(0x7f0000000040), 0x38, 0x0) 22:08:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 1: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffc, 0x0) 22:08:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 4: setresuid(0x0, 0xee00, 0xee01) syz_open_dev$dri(&(0x7f0000000000), 0xff, 0x0) 22:08:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89f2, &(0x7f0000006980)={'ip6tnl0\x00', 0x0}) 22:08:37 executing program 1: syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x84000) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:08:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 22:08:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c8"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:37 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x0, 0xc0000}) 22:08:37 executing program 1: syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x84000) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 22:08:38 executing program 4: socketpair(0x28, 0x0, 0x9c3, &(0x7f0000000180)) 22:08:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8931, &(0x7f0000006980)={'ip6tnl0\x00', 0x0}) 22:08:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c8"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, 0x0, 0x0) 22:08:38 executing program 4: syz_open_dev$video(&(0x7f0000000c80), 0xdb3b, 0x240) 22:08:38 executing program 0: mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 22:08:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c8"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x8910, &(0x7f0000006980)={'ip6tnl0\x00', 0x0}) 22:08:38 executing program 4: bpf$MAP_CREATE(0x1b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 22:08:38 executing program 0: bpf$MAP_CREATE(0xd, 0x0, 0x0) 22:08:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206fa"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 1: syz_mount_image$adfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000100), 0x8, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, 0x0) 22:08:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x796, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$nfs(0x0, &(0x7f0000000400)='./control\x00', 0xffffffffffffff81, 0x0, 0x0, 0x21040, &(0x7f0000000dc0)=ANY=[]) chdir(0x0) open(0x0, 0x0, 0x0) 22:08:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000540), 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000000)) 22:08:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:38 executing program 4: syz_open_dev$video(&(0x7f0000000540), 0x0, 0x0) 22:08:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206fa"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 478.857334][T11423] loop0: detected capacity change from 0 to 4096 22:08:39 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$IOCTL_VMCI_SET_NOTIFY(r1, 0x5450, 0x0) [ 478.989210][T11423] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 22:08:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x796, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$nfs(0x0, &(0x7f0000000400)='./control\x00', 0xffffffffffffff81, 0x0, 0x0, 0x21040, &(0x7f0000000dc0)=ANY=[]) chdir(0x0) open(0x0, 0x0, 0x0) 22:08:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:39 executing program 4: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x44801) 22:08:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206fa"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:39 executing program 1: syz_mount_image$adfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000001740)=[{&(0x7f00000001c0)="ce97f59c2ef77aadd2620124d0a0b4207fb4ad8adbd10cf8632363c3c8d26b0ad0598efe8d6d47bb0bac3b4aa28e59607f88d1092eb5e91a406862ac13c31d36a9c15b6fba59845c36588a6e79ee561b3c521039adc7ef08afedaf1c4fcf215f59bb44c3d053f91266a09b437a5acacbd5464cb78e3420574bc09d038955be8d304267136a6fdbc7de968adbbbd94c73648f61fbbb199d036b537d837a672cad0e6b7566ebb0ddc95070324beb24257ea9a69550", 0xb4}, {&(0x7f0000000280)="ef42f309e65b1e7a7ea262af83889486e4f2fb5b8687a8523e843c63ec54571444d5f6a0002737c3e85de3dd1e29ab8fbef93de814b11c24ca098df1753a1bf27922a8239b723d8b284a4ca591efc979a71d857605f8d6bd61bf9d637bed25b66af3723f726e216235b786c1ab0319973e8e0277d0d2af5291b82fe21111fdf20425e78d13dbd85018f5f326c744345d68e39c7c44c9ad4c53a2018638a90e5fae1b8c1e109109", 0xa7, 0xd6}, {&(0x7f0000000340)="153ea719d47521ec1dd08f4103a46e5f99fc46bf74c8fa2c5518778c17886ab3e2ab128467c03e7f81a53a722d04b64d4ffcc2528c6cabbe785a7e83ee5ba736c58d92fcaf38c20fc159c72c389e2c2a512936a8d40c687347356f03900d71f0f3583d568b21bacbe3f3e8ccf338376f494d38d73f2bd73363056a85ce9e774b63c567", 0x83, 0x9}, {&(0x7f0000000400)="58cec1ba353571f2d544d5e8b12ab666123e2bcdad2036576644ba4613a26380311207bbf00922be2496e5be769fea1b526df798e9320d819758730937f6a671b107a761474e94cbf1735c497aed3e7f498a504adbbf4a7b4b1caf599bab32304ed0ac9ec53e937dfdaf40aa79f348a8cae7378a4209586bd138880d219e89f91a6ba6b319098d44f4913414de83983093ac78ac65c9ce5456ca1bab20859bcf07cea754da7aec8f72028d17aeed9cd0755cd286c0fb112050bc64f20d4702f2b4494fc3a2f4ed54c1b354fbf95f134baf86b969e1943ebb981170b3a2f24e030fbb77f49cd3ebaf71da5af675374f5e5a147a02a3", 0xf5, 0xffffffffffffffc0}], 0x210008, &(0x7f0000001840)=ANY=[@ANYBLOB="2f6465762f766964656f23002c2c002c7375626a5f747970653d002c73756262287dd509a3379b928b6a5f747970653d2f6465762f766964656f23002c00"]) 22:08:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x796, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$nfs(0x0, &(0x7f0000000400)='./control\x00', 0xffffffffffffff81, 0x0, 0x0, 0x21040, &(0x7f0000000dc0)=ANY=[]) chdir(0x0) open(0x0, 0x0, 0x0) 22:08:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev, 'geneve0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) [ 479.350360][T11450] loop1: detected capacity change from 0 to 16383 22:08:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 479.470263][T11456] loop0: detected capacity change from 0 to 4096 [ 479.499855][T11450] ADFS-fs (loop1): unrecognised mount option "/dev/video#" or missing value [ 479.544692][T11456] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. 22:08:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:39 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000000cc0), 0x2, 0x0) 22:08:39 executing program 1: syz_mount_image$adfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000001740)=[{&(0x7f00000001c0)="ce97f59c2ef77aadd2620124d0a0b4207fb4ad8adbd10cf8632363c3c8d26b0ad0598efe8d6d47bb0bac3b4aa28e59607f88d1092eb5e91a406862ac13c31d36a9c15b6fba59845c36588a6e79ee561b3c521039adc7ef08afedaf1c4fcf215f59bb44c3d053f91266a09b437a5acacbd5464cb78e3420574bc09d038955be8d304267136a6fdbc7de968adbbbd94c73648f61fbbb199d036b537d837a672cad0e6b7566ebb0ddc95070324beb24257ea9a69550", 0xb4}, {&(0x7f0000000280)="ef42f309e65b1e7a7ea262af83889486e4f2fb5b8687a8523e843c63ec54571444d5f6a0002737c3e85de3dd1e29ab8fbef93de814b11c24ca098df1753a1bf27922a8239b723d8b284a4ca591efc979a71d857605f8d6bd61bf9d637bed25b66af3723f726e216235b786c1ab0319973e8e0277d0d2af5291b82fe21111fdf20425e78d13dbd85018f5f326c744345d68e39c7c44c9ad4c53a2018638a90e5fae1b8c1e109109", 0xa7, 0xd6}, {&(0x7f0000000340)="153ea719d47521ec1dd08f4103a46e5f99fc46bf74c8fa2c5518778c17886ab3e2ab128467c03e7f81a53a722d04b64d4ffcc2528c6cabbe785a7e83ee5ba736c58d92fcaf38c20fc159c72c389e2c2a512936a8d40c687347356f03900d71f0f3583d568b21bacbe3f3e8ccf338376f494d38d73f2bd73363056a85ce9e774b63c567", 0x83, 0x9}, {&(0x7f0000000400)="58cec1ba353571f2d544d5e8b12ab666123e2bcdad2036576644ba4613a26380311207bbf00922be2496e5be769fea1b526df798e9320d819758730937f6a671b107a761474e94cbf1735c497aed3e7f498a504adbbf4a7b4b1caf599bab32304ed0ac9ec53e937dfdaf40aa79f348a8cae7378a4209586bd138880d219e89f91a6ba6b319098d44f4913414de83983093ac78ac65c9ce5456ca1bab20859bcf07cea754da7aec8f72028d17aeed9cd0755cd286c0fb112050bc64f20d4702f2b4494fc3a2f4ed54c1b354fbf95f134baf86b969e1943ebb981170b3a2f24e030fbb77f49cd3ebaf71da5af675374f5e5a147a02a3", 0xf5, 0xffffffffffffffc0}], 0x210008, &(0x7f0000001840)=ANY=[@ANYBLOB="2f6465762f766964656f23002c2c002c7375626a5f747970653d002c73756262287dd509a3379b928b6a5f747970653d2f6465762f766964656f23002c00"]) 22:08:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 480.101567][T11475] loop1: detected capacity change from 0 to 16383 [ 480.123615][T11475] ADFS-fs (loop1): unrecognised mount option "/dev/video#" or missing value [ 480.153321][ T3969] I/O error, dev loop0, sector 3968 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 22:08:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:40 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @dev, 'geneve0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 22:08:40 executing program 1: bpf$MAP_CREATE(0x13, &(0x7f0000000000), 0x40) 22:08:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:40 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89a0, 0x0) 22:08:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:40 executing program 0: syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), 0xffffffffffffffff) 22:08:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:40 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000540), 0x0, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e256cdc4"}, 0x0, 0x0, @planes=0x0}) 22:08:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:40 executing program 1: clone3(&(0x7f0000000340)={0x800000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:08:40 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:41 executing program 4: recvmsg$can_j1939(0xffffffffffffffff, 0x0, 0x2fcf3c93da33f12b) 22:08:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ocfs2(&(0x7f0000000300), &(0x7f00000003c0)='./control\x00', 0x100000001, 0x1, &(0x7f0000001dc0)=[{&(0x7f0000000d80)="bc7b5c5fb51254e1ffbf8d7fbd02", 0xe}], 0x7020, &(0x7f0000002180)={[{'qM\xb8\xb6\xd0\xc6\xf9\xed\xf0\x9b\x91\xa7A\x9cj\x88S.\xbd[\xd0\x03\x92\x9f\x94\xd8\x04\x00\x00\x00X\xd2\xben\xf4_\xf6?\x82\xd69\t\v\xd6\xed\x84\"\xee\xc6\x15\t\xb9\xf6!(&_p\xb6\x142\x8afO:\x00b\x931\xcb-\x93\xb4\x11\x8a\x11\fgr\xbd\xdd2\xcag\xa5z\x05|\xca\x81\xe2+\xac\x980\x1a;\xd4\xeb\xd5\aC\x1a\xcan\xbd\xbb/N\xe8\xf7\xa7\xc3\xc9*J\x90\xd8\x99\xce\xe2\x88\x8e;\xaf\x80*\xad\xbd\fQ\x9aE\x97L\t\x976\xebO\x05)\x12T\xf1%\xa5\xe6r\xf6\xd9S\xe9\xbe\x1b'}, {'pcr'}, {',+(^'}, {}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@dont_appraise}, {@context={'context', 0x3d, 'sysadm_u'}}]}) faccessat(0xffffffffffffffff, &(0x7f0000000480)='./control\x00', 0xd) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000380)=ANY=[], 0x44) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x1) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) write$binfmt_elf64(r0, &(0x7f0000002400)=ANY=[], 0xaf9) socket$unix(0x1, 0x2, 0x0) [ 481.285360][T11521] loop1: detected capacity change from 0 to 4096 22:08:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:41 executing program 4: syz_open_dev$video(&(0x7f0000000c80), 0xdb3b, 0x0) 22:08:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e30"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:41 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:41 executing program 4: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000300)={0x0, @sliced}) 22:08:41 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) [ 481.653641][T11521] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 22:08:41 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000040)={0x0, 0x0, 0x0}) 22:08:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e30"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:41 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ocfs2(&(0x7f0000000300), &(0x7f00000003c0)='./control\x00', 0x100000001, 0x1, &(0x7f0000001dc0)=[{&(0x7f0000000d80)="bc7b5c5fb51254e1ffbf8d7fbd02", 0xe}], 0x7020, &(0x7f0000002180)={[{'qM\xb8\xb6\xd0\xc6\xf9\xed\xf0\x9b\x91\xa7A\x9cj\x88S.\xbd[\xd0\x03\x92\x9f\x94\xd8\x04\x00\x00\x00X\xd2\xben\xf4_\xf6?\x82\xd69\t\v\xd6\xed\x84\"\xee\xc6\x15\t\xb9\xf6!(&_p\xb6\x142\x8afO:\x00b\x931\xcb-\x93\xb4\x11\x8a\x11\fgr\xbd\xdd2\xcag\xa5z\x05|\xca\x81\xe2+\xac\x980\x1a;\xd4\xeb\xd5\aC\x1a\xcan\xbd\xbb/N\xe8\xf7\xa7\xc3\xc9*J\x90\xd8\x99\xce\xe2\x88\x8e;\xaf\x80*\xad\xbd\fQ\x9aE\x97L\t\x976\xebO\x05)\x12T\xf1%\xa5\xe6r\xf6\xd9S\xe9\xbe\x1b'}, {'pcr'}, {',+(^'}, {}], [{@fowner_eq={'fowner', 0x3d, 0xee00}}, {@dont_appraise}, {@context={'context', 0x3d, 'sysadm_u'}}]}) faccessat(0xffffffffffffffff, &(0x7f0000000480)='./control\x00', 0xd) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000380)=ANY=[], 0x44) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x1) sendfile(r0, r0, &(0x7f0000000240), 0x7fff) write$binfmt_elf64(r0, &(0x7f0000002400)=ANY=[], 0xaf9) socket$unix(0x1, 0x2, 0x0) 22:08:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:42 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:42 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000000)="799c6af9ba07d46e", 0x8) 22:08:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e30"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:42 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 482.331233][T11563] loop1: detected capacity change from 0 to 4096 22:08:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 482.383846][T11563] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 22:08:42 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:42 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000000)="799c6af9ba07d46e", 0x8) [ 482.710388][T11567] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1141: group 0, block bitmap and bg descriptor inconsistent: 50 vs 25 free clusters 22:08:42 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x0, 0x3938700}, &(0x7f0000000400)={&(0x7f00000003c0), 0x8}) 22:08:42 executing program 0: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:42 executing program 4: syz_mount_image$adfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000001100)=[{0x0}], 0x0, 0x0) 22:08:42 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x2, &(0x7f0000000080)={0x0}) 22:08:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:43 executing program 1: openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000380)='./file0/file0\x00', 0x40) 22:08:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 4: socketpair(0x22, 0x2, 0x1, &(0x7f00000018c0)) [ 483.240929][T11605] loop1: detected capacity change from 0 to 4096 22:08:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r3}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) [ 483.379124][T11605] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. 22:08:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r3}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x14}, 0x14}}, 0x0) 22:08:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)=0x0) timer_settime(r1, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) sched_getscheduler(0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000380)=""/163, 0xa3}], 0x1) 22:08:43 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 0: syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r3}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:43 executing program 0: syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) 22:08:43 executing program 1: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="a6", 0x1, 0xd30f}], 0x1010000, &(0x7f00000002c0)=ANY=[@ANYBLOB='norecovery,norecovery,order=s', @ANYBLOB]) 22:08:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r3}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 484.072678][T11641] loop1: detected capacity change from 0 to 211 22:08:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 0: syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={0x0, 0x3f00}) [ 484.153168][T11641] NILFS (loop1): couldn't find nilfs on the device 22:08:44 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, 0x0) [ 484.249999][ T3969] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 484.313181][ T3969] Buffer I/O error on dev loop1, logical block 0, async page read [ 484.367375][ T3969] I/O error, dev loop1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 484.435625][ T3969] Buffer I/O error on dev loop1, logical block 2, async page read [ 484.452700][ T3969] I/O error, dev loop1, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 484.463589][ T3969] Buffer I/O error on dev loop1, logical block 3, async page read 22:08:44 executing program 4: syz_open_dev$sg(&(0x7f0000000100), 0x0, 0x0) 22:08:44 executing program 1: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="a6", 0x1, 0xd30f}], 0x1010000, &(0x7f00000002c0)=ANY=[@ANYBLOB='norecovery,norecovery,order=s', @ANYBLOB]) 22:08:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r3}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, 0x0) [ 484.600201][T11660] loop1: detected capacity change from 0 to 211 22:08:44 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, 0x0) [ 484.693379][T11660] NILFS (loop1): couldn't find nilfs on the device 22:08:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r0, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r3}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r2, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r1, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='cdg\x00', 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c) 22:08:44 executing program 1: syz_genetlink_get_family_id$ieee802154(&(0x7f00000004c0), 0xffffffffffffffff) 22:08:44 executing program 0: bpf$MAP_CREATE(0x14, 0x0, 0x0) 22:08:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8941, 0x0) 22:08:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_VMCI_CTX_ADD_NOTIFICATION(r0, 0x7af, 0x0) 22:08:45 executing program 4: getpeername$llc(0xffffffffffffffff, 0x0, 0x0) 22:08:45 executing program 1: bpf$MAP_CREATE(0x17, &(0x7f0000000000), 0x40) 22:08:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x19, 0x0, 0x0, 0x8001}, 0x40) 22:08:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0xa3}, 0x40) 22:08:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 22:08:45 executing program 4: syz_open_dev$video(0x0, 0x0, 0x0) 22:08:45 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 22:08:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="240000000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x541b, &(0x7f0000001fc0)={'tunl0\x00', 0x0}) 22:08:45 executing program 4: syz_mount_image$adfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x3, &(0x7f0000001740)=[{&(0x7f00000001c0)="ce", 0x1}, {&(0x7f0000000400)='X', 0x1, 0xffffffffffffffc0}, {&(0x7f0000000500)='O', 0x1, 0x7fffffff}], 0x210008, &(0x7f0000001840)=ANY=[]) 22:08:45 executing program 0: syz_open_dev$dri(&(0x7f0000000000), 0xffffffffffffffff, 0x101040) 22:08:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="240000000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 485.681476][T11717] loop4: detected capacity change from 0 to 264192 22:08:45 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0xa0402, 0x0) 22:08:45 executing program 1: syz_open_dev$dri(&(0x7f00000000c0), 0xffffffffffffffff, 0x0) [ 485.736751][T11717] ADFS-fs (loop4): error: can't find an ADFS filesystem on dev loop4. 22:08:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 1: socketpair(0x10, 0x2, 0x3, &(0x7f00000018c0)) 22:08:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:45 executing program 4: request_key(&(0x7f0000000100)='rxrpc_s\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='/dev/vsock\x00', 0xfffffffffffffff8) 22:08:46 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000040)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast2}}}}) 22:08:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="240000000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 4: r0 = openat$6lowpan_enable(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$6lowpan_enable(r0, &(0x7f0000000100)='1', 0x1) 22:08:46 executing program 1: socket$inet_udp(0x2, 0x3, 0x0) 22:08:46 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) socketpair(0x0, 0x0, 0x0, &(0x7f0000001780)) 22:08:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 4: clone3(&(0x7f00000014c0)={0x28004000, 0x0, 0x0, 0x0, {0x19}, 0x0, 0x0, 0x0, &(0x7f0000001480)=[0x0], 0x1}, 0x58) 22:08:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="2400000000000000010000000100", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="2400000000000000010000000100", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, 0x0) 22:08:46 executing program 1: clone3(&(0x7f0000000300)={0x80004000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:08:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$xdp(r0, &(0x7f0000000040), 0x10) 22:08:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x0, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 0: r0 = socket(0xa, 0x3, 0x3) sendmmsg$nfc_llcp(r0, &(0x7f0000002b80)=[{&(0x7f0000000000)={0xa, 0x0, 0x0, 0x0, 0x0, 0x0, "abbed27c3170ec68f8b2287c1033def778f1e68c940e31e90bc6dbabb720e414f7b30fda471b9f08822c109930c62a0cf77bee7a261db97291801e8568d0e9"}, 0x60, 0x0}], 0x1, 0x0) 22:08:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="2400000000000000010000000100", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:46 executing program 4: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000004c0), 0xffffffffffffffff) 22:08:47 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8903, 0x0) 22:08:47 executing program 4: syz_mount_image$adfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:08:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x0, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:47 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0x0, 0x0) 22:08:47 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86405, 0x0) 22:08:47 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000b80)='syz1\x00', 0x1ff) 22:08:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="240000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:47 executing program 0: r0 = syz_open_dev$vivid(&(0x7f0000000580), 0x2, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f00000006c0)={0x9d0000, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000680)}) 22:08:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x0, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:47 executing program 4: bpf$MAP_CREATE(0x11, 0x0, 0x0) 22:08:47 executing program 0: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000600)={0x0, 0x0, @name="fd04e5df684a53f73dcd894e1618b95e22e9c7cf8c03aa0a7e35a17f8acb32e4"}) 22:08:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="240000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:47 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x10000, 0x4) 22:08:47 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x401c5820, &(0x7f0000000080)={0x0}) 22:08:47 executing program 0: clone3(&(0x7f0000000900)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 22:08:48 executing program 1: bpf$MAP_CREATE(0x8, &(0x7f0000000000), 0x40) 22:08:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000001ac0)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x0) 22:08:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=@newneigh={0x30, 0x1c, 0x1, 0x0, 0x0, {0xc}, [@NDA_DST_IPV6={0x14, 0x1, @mcast2}]}, 0x30}}, 0x0) 22:08:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="240000000000000001000000010000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000640)={0x28, r1, 0x201, 0x0, 0x0, {{}, {@val={0x8, 0x11a}, @val={0xc}}}}, 0x28}}, 0x0) 22:08:48 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap$KVM_VCPU(&(0x7f0000ffa000/0x3000)=nil, 0x930, 0x0, 0x12, r0, 0x0) 22:08:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x0, 0x0, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 0: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}}, &(0x7f0000000180)) 22:08:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 488.289453][T11840] netlink: 'syz-executor.1': attribute type 282 has an invalid length. 22:08:48 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) shmat(r0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x5000) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) 22:08:48 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000200)) timer_gettime(0x0, &(0x7f0000000240)) 22:08:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4068aea3, &(0x7f0000000000)) 22:08:48 executing program 4: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = eventfd2(0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) io_submit(r0, 0x3, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x6fee, r1, 0x0, 0x0, 0x0, 0x0, 0x3, r2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1, r4}, 0x0]) 22:08:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 1: r0 = io_uring_setup(0x579f, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 22:08:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 4: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x4, 0x0, r2, 0x0}]) 22:08:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000040)=0xfffffffffffffff8, 0x8) 22:08:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x8208ae63, &(0x7f0000000000)) 22:08:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:48 executing program 4: r0 = syz_io_uring_setup(0xc72, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00007ff000/0x800000)=nil, &(0x7f0000000200), &(0x7f0000000240)) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x8, &(0x7f0000000280), 0x1) 22:08:49 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 22:08:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4008ae48, &(0x7f0000000000)) 22:08:49 executing program 0: r0 = syz_open_dev$MSR(&(0x7f00000000c0), 0x0, 0x0) read$msr(r0, 0x0, 0x0) 22:08:49 executing program 1: signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipmr_delroute={0x2c, 0x19, 0x200, 0x70bd2c, 0x25dfdbff, {0x80, 0x20, 0x20, 0x5, 0xfe, 0x1, 0x0, 0x9, 0x2000}, [@RTA_PREFSRC={0x8, 0x7, @private=0xa010100}, @RTA_GATEWAY={0x8, 0x5, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20044844}, 0x40001) mount$cgroup(0x20100000, &(0x7f0000000240)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)={[{@name={'name', 0x3d, 'cgroupl'}}, {@xattr}, {@none}, {}, {@none}, {@name={'name', 0x3d, 'cpuset_v2_mode'}}, {@cpuset_v2_mode}, {}, {@clone_children}]}) r1 = getpgid(0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x803, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r2, 0x5000940e, &(0x7f0000000780)={{r3}, "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"}) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f0000000400)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) bind(0xffffffffffffffff, &(0x7f0000000380)=@generic={0x11, "0000010000000000080044944eeba71a4976e2526f0c0900000036005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000001000101013c5811039e17775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c0001000000f3ffff2f43740000000000000006ad8e5ecc326d3a0000c2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, &(0x7f0000000180)=0x400, 0x4) bind$xdp(0xffffffffffffffff, &(0x7f0000000900)={0x2c, 0x0, r4}, 0x10) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_io_uring_complete(0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r5, 0x89fa, &(0x7f0000000140)={'syztnl2\x00', &(0x7f0000000200)={'ip6tnl0\x00', r4, 0x4, 0x0, 0x51, 0x6, 0x12, @private1={0xfc, 0x1, '\x00', 0x1}, @local, 0x80, 0x8, 0x9, 0x8000}}) sendmsg$nl_route(r6, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=@bridge_dellink={0xac, 0x11, 0x10, 0x70bd25, 0x25dfdbfd, {0x7, 0x0, 0x0, r7, 0xf04, 0x180}, [@IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'team_slave_1\x00'}, {0x14, 0x35, 'macvtap0\x00'}, {0x14, 0x35, 'bridge0\x00'}, {0x14}, {0x14, 0x35, 'ip6gretap0\x00'}]}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_PHYS_SWITCH_ID={0x1a, 0x24, "b782ba70465a540bb3a919ff6136173df1243201e587"}]}, 0xac}, 0x1, 0x0, 0x0, 0x20000850}, 0x80) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001780)={{{@in=@initdev, @in=@multicast2}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000000340)=0xe8) 22:08:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 0: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) [ 489.328594][T11897] cgroup: name respecified 22:08:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 1: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x0, r2, 0x0}]) 22:08:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000240)={0x0, 0x0, 0x0, r2, 0x2}) 22:08:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 0: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 22:08:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4010ae67, &(0x7f0000000000)) 22:08:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:49 executing program 4: io_setup(0x9, &(0x7f00000028c0)=0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff4a}]) 22:08:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4020aeb2, &(0x7f0000000000)) 22:08:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$cgroup_devices(r1, 0x0, 0x0) 22:08:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4010ae67, &(0x7f0000000000)) 22:08:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4010ae68, &(0x7f0000000000)) 22:08:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x8070ae9f, 0x0) 22:08:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)=@dellink={0x24, 0x11, 0x1, 0x0, 0x0, {}, [@IFLA_PROP_LIST={0x4}]}, 0x24}}, 0x0) 22:08:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4030ae7b, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x1}) 22:08:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 4: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 22:08:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x8030ae7c, 0x0) 22:08:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:50 executing program 0: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r0, 0x1, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0, 0x0, 0xffffffffffffffff}]) 22:08:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 22:08:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 0: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = eventfd2(0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) io_submit(r0, 0x3, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x6fee, r1, 0x0, 0x0, 0x0, 0x0, 0x3, r2}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0]) 22:08:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 1: io_setup(0x8, &(0x7f00000001c0)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) io_submit(r0, 0x1, &(0x7f0000000400)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x9c4}]) 22:08:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 0: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = eventfd2(0x0, 0x0) io_submit(r0, 0x2, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x6fee, r1, 0x0, 0x0, 0x0, 0x0, 0x3, r2}, 0x0]) 22:08:51 executing program 1: io_setup(0x9, &(0x7f00000028c0)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r0, 0x1, &(0x7f0000001840)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 22:08:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r2}) 22:08:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00'}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 0: syz_open_dev$rtc(&(0x7f00000002c0), 0x9, 0x40200) 22:08:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0xc018aec0, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x1}) 22:08:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0xae47, 0x0) 22:08:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)=@dellink={0x20, 0x11, 0x1}, 0x20}}, 0x0) 22:08:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0}) 22:08:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0xae71, &(0x7f0000000000)) 22:08:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 0: syz_io_uring_setup(0x353d, &(0x7f00000002c0), &(0x7f0000d9a000/0x1000)=nil, &(0x7f0000b59000/0x2000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0xc72, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00007ff000/0x800000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 22:08:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000003d000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x40, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[], 0x0, 0x30010}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:08:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4008ae48, 0x0) 22:08:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 4: setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000000040), 0xfffffffffffffe11) [ 492.432953][T12055] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 22:08:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 0: syz_io_uring_setup(0x2b3, &(0x7f00000002c0), &(0x7f0000bdf000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) syz_io_uring_setup(0xc72, &(0x7f0000000180), &(0x7f0000ffd000/0x3000)=nil, &(0x7f00007ff000/0x800000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 22:08:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000003d000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x40, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x100000], 0x5000, 0x30010}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:08:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000003d000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x40, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[], 0x0, 0x30010}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:08:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) pipe2$9p(&(0x7f0000000280), 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000583000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000056f000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000040)="e54065f2ab3e2636660f38dc06872366b9b10200000f32660ff45cb366b9260a00000f320f092e0f2047072e64660f3881971188", 0x34}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 22:08:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r5 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x8030ae7c, &(0x7f0000000000)) 22:08:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x0, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 22:08:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000008fe519772187277200000091d7e2f3c7ca20af5b8625636d2dbd63b5516ce67ad6f0e612b2140000000000000045ba0c6131bcd6cde75f8547df93ac5202f47bb26953038168b8be9429bb8730cbd30624b5fcad8f26a8840a5df42ce03b5e67ea82f12c5666a713703a6040365fd897dcbb14c54e12ee01664953a111cc8268ceff4b9225ae58281ad52b9d8f94103e5a9a4cd3843ab769a55aeccdbc1c5bf36910414a00f844266b68006829b3cea0f905cf15fa4fd589f33ddd"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200)=0x1600, 0x43408) perf_event_open(&(0x7f0000000540)={0x3, 0x80, 0x1, 0x7f, 0x5, 0x5, 0x0, 0x3, 0x40080, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffff0001, 0x1, @perf_bp={&(0x7f0000000400), 0x6}, 0x1000, 0x3, 0x5, 0x0, 0x12a, 0x9, 0x5, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x2, r1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0xc, &(0x7f0000000640)=ANY=[@ANYRES32], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES16=r1, @ANYRES32, @ANYRES32, @ANYBLOB="2c00000000000000010000000100", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES16=r0, @ANYBLOB="000000005b7c4bcbd5280e619d831edf548aa4053111937d58571ff994b667636a37b5513afcf2c80b47052bf7102add16b23e56f3368431c9e206faa0f0cd03004b3156d517e349df2641161e301f93"], 0xc0}, 0x10000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='compact_retry\x00', r4}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000001cf80)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000001d040)={0x18, 0x7, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x4}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x5}]}, &(0x7f00000004c0)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000007c0)=""/4096, 0x0, 0x12, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f000001cfc0)={0x0, 0x5}, 0x8, 0x10, &(0x7f000001d000)={0x0, 0xa, 0x5, 0x400}, 0x10}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100)={r3, 0xffffffffffffffff, 0x2}, 0x10) r6 = openat$cgroup_subtree(r2, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000440)={[{0x2d, 'pids'}]}, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000005740)={0x0, 0x1, &(0x7f00000003c0)=@raw=[@call={0x85, 0x0, 0x0, 0xb1}], &(0x7f0000000600)='syzkaller\x00', 0x20, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000005640)={0x6, 0x3}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 493.691044][T12072] ------------[ cut here ]------------ [ 493.731134][T12072] WARNING: CPU: 1 PID: 12072 at arch/x86/kvm/vmx/nested.c:4570 nested_vmx_vmexit+0x34db/0x3b70 [ 493.841702][T12072] Modules linked in: [ 493.867047][T12072] CPU: 1 PID: 12072 Comm: syz-executor.4 Not tainted 5.16.0-rc5-next-20211216-syzkaller #0 [ 493.897868][T12072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.945078][T12072] RIP: 0010:nested_vmx_vmexit+0x34db/0x3b70 [ 493.964339][T12072] Code: 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 84 15 ef ff ff 48 c7 c7 08 c2 92 8d e8 5f c4 9e 00 e9 04 ef ff ff e8 95 b6 53 00 <0f> 0b e9 85 f5 ff ff e8 89 b6 53 00 0f 0b e9 a6 eb ff ff e8 7d b6 [ 493.984962][T12072] RSP: 0018:ffffc9000dc37830 EFLAGS: 00010246 [ 493.991909][T12072] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000bc4f000 [ 494.000424][T12072] RDX: 0000000000040000 RSI: ffffffff81244aab RDI: 0000000000000003 [ 494.009207][T12072] RBP: ffffc9000dc37980 R08: 0000000000000007 R09: 0000000000000001 [ 494.020587][T12072] R10: ffffffff8124402e R11: 0000000000000000 R12: 0000000000000000 [ 494.028833][T12072] R13: 0000000000000001 R14: ffff8880753bc000 R15: ffff88807d3d0000 [ 494.036841][T12072] FS: 00007f0061aeb700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 494.047815][T12072] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 494.054553][T12072] CR2: 00007f4774d411b8 CR3: 000000007eeb5000 CR4: 00000000003526e0 [ 494.062782][T12072] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 494.071554][T12072] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 494.079623][T12072] Call Trace: [ 494.082942][T12072] [ 494.085876][T12072] ? nested_mark_vmcs12_pages_dirty+0x260/0x260 [ 494.092357][T12072] ? kvm_arch_vcpu_load+0x3ae/0x860 [ 494.097869][T12072] ? lock_downgrade+0x6e0/0x6e0 [ 494.102787][T12072] ? do_raw_spin_lock+0x120/0x2b0 [ 494.107995][T12072] ? rwlock_bug.part.0+0x90/0x90 [ 494.112968][T12072] ? nested_vmx_free_vcpu+0xaa/0xc0 [ 494.118266][T12072] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 494.124602][T12072] nested_vmx_free_vcpu+0xaa/0xc0 [ 494.129717][T12072] vmx_free_vcpu+0x8d/0x1a0 [ 494.134319][T12072] kvm_arch_vcpu_destroy+0x72/0x2f0 [ 494.139625][T12072] kvm_destroy_vcpus+0x11f/0x290 [ 494.144686][T12072] ? kvm_get_stat_per_vcpu+0x260/0x260 [ 494.151255][T12072] ? kvm_arch_vcpu_put+0x56c/0x860 [ 494.156422][T12072] kvm_arch_destroy_vm+0x2e8/0x470 [ 494.163162][T12072] ? kvm_arch_pre_destroy_vm+0x20/0x20 [ 494.168780][T12072] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 494.175214][T12072] kvm_put_kvm+0x4fa/0xb00 [ 494.179833][T12072] kvm_vcpu_release+0x4d/0x70 [ 494.184545][T12072] __fput+0x286/0x9f0 [ 494.188737][T12072] ? kvm_vm_release+0x50/0x50 [ 494.193605][T12072] task_work_run+0xdd/0x1a0 [ 494.198316][T12072] get_signal+0x1b01/0x28b0 [ 494.202915][T12072] ? kfree+0x1ea/0x4b0 [ 494.207160][T12072] ? force_sigsegv+0x150/0x150 [ 494.211957][T12072] ? kvm_vcpu_ioctl+0x323/0xf30 [ 494.216852][T12072] arch_do_signal_or_restart+0x2a9/0x1c40 [ 494.222702][T12072] ? find_held_lock+0x2d/0x110 [ 494.227530][T12072] ? get_sigframe_size+0x10/0x10 [ 494.232492][T12072] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 494.238788][T12072] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 494.245066][T12072] ? kick_process+0xf2/0x190 [ 494.250564][T12072] ? task_work_add+0xa4/0x190 [ 494.255288][T12072] exit_to_user_mode_prepare+0x17d/0x290 [ 494.261041][T12072] syscall_exit_to_user_mode+0x19/0x60 [ 494.266634][T12072] do_syscall_64+0x42/0xb0 [ 494.272644][T12072] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 494.278691][T12072] RIP: 0033:0x7f0063175e99 [ 494.283128][T12072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 494.302981][T12072] RSP: 002b:00007f0061aeb168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 494.311499][T12072] RAX: fffffffffffffffc RBX: 00007f0063288f60 RCX: 00007f0063175e99 [ 494.319601][T12072] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 494.327656][T12072] RBP: 00007f00631cfff1 R08: 0000000000000000 R09: 0000000000000000 [ 494.335639][T12072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 494.343874][T12072] R13: 00007ffd95664eef R14: 00007f0061aeb300 R15: 0000000000022000 [ 494.353260][T12072] [ 494.356309][T12072] Kernel panic - not syncing: panic_on_warn set ... [ 494.362880][T12072] CPU: 1 PID: 12072 Comm: syz-executor.4 Not tainted 5.16.0-rc5-next-20211216-syzkaller #0 [ 494.372848][T12072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.382895][T12072] Call Trace: [ 494.386166][T12072] [ 494.389091][T12072] dump_stack_lvl+0xcd/0x134 [ 494.394345][T12072] panic+0x2b0/0x6dd [ 494.398265][T12072] ? __warn_printk+0xf3/0xf3 [ 494.402873][T12072] ? __warn.cold+0x1d1/0x2cf [ 494.407464][T12072] ? nested_vmx_vmexit+0x34db/0x3b70 [ 494.412770][T12072] __warn.cold+0x1ec/0x2cf [ 494.417202][T12072] ? nested_vmx_vmexit+0x34db/0x3b70 [ 494.422506][T12072] report_bug+0x1bd/0x210 [ 494.426934][T12072] handle_bug+0x3c/0x60 [ 494.431108][T12072] exc_invalid_op+0x14/0x40 [ 494.435605][T12072] asm_exc_invalid_op+0x12/0x20 [ 494.440449][T12072] RIP: 0010:nested_vmx_vmexit+0x34db/0x3b70 [ 494.446365][T12072] Code: 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 84 15 ef ff ff 48 c7 c7 08 c2 92 8d e8 5f c4 9e 00 e9 04 ef ff ff e8 95 b6 53 00 <0f> 0b e9 85 f5 ff ff e8 89 b6 53 00 0f 0b e9 a6 eb ff ff e8 7d b6 [ 494.466058][T12072] RSP: 0018:ffffc9000dc37830 EFLAGS: 00010246 [ 494.472234][T12072] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000bc4f000 [ 494.480201][T12072] RDX: 0000000000040000 RSI: ffffffff81244aab RDI: 0000000000000003 [ 494.488196][T12072] RBP: ffffc9000dc37980 R08: 0000000000000007 R09: 0000000000000001 [ 494.496202][T12072] R10: ffffffff8124402e R11: 0000000000000000 R12: 0000000000000000 [ 494.504191][T12072] R13: 0000000000000001 R14: ffff8880753bc000 R15: ffff88807d3d0000 [ 494.512188][T12072] ? nested_vmx_vmexit+0x2a5e/0x3b70 [ 494.517487][T12072] ? nested_vmx_vmexit+0x34db/0x3b70 [ 494.522817][T12072] ? nested_mark_vmcs12_pages_dirty+0x260/0x260 [ 494.529103][T12072] ? kvm_arch_vcpu_load+0x3ae/0x860 [ 494.534325][T12072] ? lock_downgrade+0x6e0/0x6e0 [ 494.539187][T12072] ? do_raw_spin_lock+0x120/0x2b0 [ 494.544243][T12072] ? rwlock_bug.part.0+0x90/0x90 [ 494.549182][T12072] ? nested_vmx_free_vcpu+0xaa/0xc0 [ 494.554395][T12072] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 494.560735][T12072] nested_vmx_free_vcpu+0xaa/0xc0 [ 494.565790][T12072] vmx_free_vcpu+0x8d/0x1a0 [ 494.570303][T12072] kvm_arch_vcpu_destroy+0x72/0x2f0 [ 494.575540][T12072] kvm_destroy_vcpus+0x11f/0x290 [ 494.580507][T12072] ? kvm_get_stat_per_vcpu+0x260/0x260 [ 494.585988][T12072] ? kvm_arch_vcpu_put+0x56c/0x860 [ 494.591107][T12072] kvm_arch_destroy_vm+0x2e8/0x470 [ 494.596225][T12072] ? kvm_arch_pre_destroy_vm+0x20/0x20 [ 494.601697][T12072] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 494.607976][T12072] kvm_put_kvm+0x4fa/0xb00 [ 494.612408][T12072] kvm_vcpu_release+0x4d/0x70 [ 494.617083][T12072] __fput+0x286/0x9f0 [ 494.621088][T12072] ? kvm_vm_release+0x50/0x50 [ 494.625791][T12072] task_work_run+0xdd/0x1a0 [ 494.630293][T12072] get_signal+0x1b01/0x28b0 [ 494.634795][T12072] ? kfree+0x1ea/0x4b0 [ 494.638881][T12072] ? force_sigsegv+0x150/0x150 [ 494.643773][T12072] ? kvm_vcpu_ioctl+0x323/0xf30 [ 494.648665][T12072] arch_do_signal_or_restart+0x2a9/0x1c40 [ 494.654403][T12072] ? find_held_lock+0x2d/0x110 [ 494.659197][T12072] ? get_sigframe_size+0x10/0x10 [ 494.664164][T12072] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 494.670444][T12072] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 494.676781][T12072] ? kick_process+0xf2/0x190 [ 494.681376][T12072] ? task_work_add+0xa4/0x190 [ 494.686102][T12072] exit_to_user_mode_prepare+0x17d/0x290 [ 494.691761][T12072] syscall_exit_to_user_mode+0x19/0x60 [ 494.697230][T12072] do_syscall_64+0x42/0xb0 [ 494.701670][T12072] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 494.707602][T12072] RIP: 0033:0x7f0063175e99 [ 494.712384][T12072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 494.731996][T12072] RSP: 002b:00007f0061aeb168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 494.740410][T12072] RAX: fffffffffffffffc RBX: 00007f0063288f60 RCX: 00007f0063175e99 [ 494.748391][T12072] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 494.756360][T12072] RBP: 00007f00631cfff1 R08: 0000000000000000 R09: 0000000000000000 [ 494.764327][T12072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 494.772442][T12072] R13: 00007ffd95664eef R14: 00007f0061aeb300 R15: 0000000000022000 [ 494.780432][T12072] [ 494.783953][T12072] Kernel Offset: disabled [ 494.788441][T12072] Rebooting in 86400 seconds..