0cc0)={0x7, 0x20, &(0x7f0000000600)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x968}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_val={0x18, 0x9, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x4}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x5}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xdba}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x5a, &(0x7f0000000700)=""/90, 0xc2f00, 0x15, '\x00', r3, 0x34, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r4, r2, 0x7, &(0x7f0000000c00)=[r1, r5, r6, r1, r1, r1, r1, r1, r1, r7], &(0x7f0000000c40)=[{0x2, 0x5, 0x2, 0x2}, {0x1, 0x3, 0x5, 0x7}, {0x5, 0x2, 0x0, 0x2}, {0x2, 0x5, 0x10, 0x5}, {0x2, 0x5, 0x10}, {0x0, 0x5, 0x8, 0xb}, {0x0, 0x3, 0x7}], 0x10, 0x3}, 0x90) 01:26:20 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) 01:26:20 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x6, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x6, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:20 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x4, 0x0, r0, 0x4a2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0xe0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000e00)=[0x0], 0x0, 0x81, &(0x7f0000000e40)=[{}], 0x8, 0x10, &(0x7f0000000e80), &(0x7f0000000ec0), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000f00)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x17c, 0x17c, 0xb, [@fwd={0x4}, @fwd={0x6}, @enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0x8, 0x100}, {0xa, 0x4}, {0xa, 0xe2}]}, @union={0xa, 0x5, 0x0, 0x5, 0x0, 0x800, [{0x0, 0x3, 0x7}, {0x9, 0x5, 0x7fff}, {0x4, 0x3, 0x7}, {0x2, 0x5, 0xffff}, {0xd, 0x5, 0x8000}]}, @union={0xf, 0x6, 0x0, 0x5, 0x0, 0x80, [{0xb, 0x5, 0xfffffffd}, {0x0, 0x1, 0x10001}, {0xb, 0x1, 0x80000001}, {0x2, 0x4, 0x6}, {0xb, 0x3}, {0x1, 0x0, 0x6}]}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x10001, [{0x0, 0x0, 0x3}, {0xc, 0x0, 0x8001}, {0xb, 0x5, 0x1}, {0x7}, {0x8, 0x0, 0x6}, {0x6, 0x0, 0x2}]}, @func={0xf, 0x0, 0x0, 0xc, 0x2}, @enum={0x8, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x55a}]}, @union={0x3, 0x2, 0x0, 0x5, 0x1, 0x3, [{0xf, 0x3, 0x2}, {0xd, 0x4, 0x48000000}]}, @typedef={0x5, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x0, 0x2e, 0x5f, 0x6f, 0x61, 0x61, 0x5f, 0x61, 0x61]}}, &(0x7f0000001240)=""/101, 0x19f, 0x65, 0x0, 0x3}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x30, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x100}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xb7b, 0x0, 0x0, 0x0, 0x1000}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xd03c}, @ldst={0x3, 0x1, 0x2, 0x0, 0xa, 0xffffffffffffff5e, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x7, 0x6, 0x3, 0x4, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x8, 0x8, &(0x7f00000004c0)=""/8, 0x41000, 0x55, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000001300)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000001340)={0x2, 0x7, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000001380)=[{0x1, 0x3, 0x1, 0x7}, {0x3, 0x3, 0x5, 0x6}, {0x2, 0x1, 0x5, 0x7}, {0x4, 0x1, 0x7, 0xa}, {0x3, 0x5, 0x5, 0x2}, {0x3, 0x5, 0x6, 0x1}, {0x4, 0x2, 0xf, 0xa}, {0x4, 0x5, 0x10, 0x8}, {0x1, 0x3, 0x3}, {0x2, 0x4, 0x7, 0x4}], 0x10, 0x4e}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0], 0x0, 0xfc, &(0x7f00000009c0)=[{}], 0x8, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c80)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001500)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x80}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d40)={0x6, 0x13, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000101007ca2b9a27a0100000000000900400018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000083000000bf090000000000005509010000000000950000000000000018450000ffffffff00000000000000008d0a02000800000085100000f9ffffffbf91000000000000b7020000020000008500000084000000b700000000000000950000a632610000000000"], &(0x7f00000008c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x22, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x1, 0x62a3748, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[r6]}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xd6, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x30}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r7, r1}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0x1}, &(0x7f0000000680), &(0x7f0000000700)=r7}, 0x20) 01:26:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r0, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:20 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:20 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0], 0x0, 0x45, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x44, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x7f, &(0x7f0000000400)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x82, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@ifindex, 0x35, 0x0, 0x5, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780)={@ifindex=r0, r1, 0x24, 0x20, 0x0, @prog_id=r2, r3}, 0x20) 01:26:20 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x4, 0x0, r0, 0x4a2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0xe0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000e00)=[0x0], 0x0, 0x81, &(0x7f0000000e40)=[{}], 0x8, 0x10, &(0x7f0000000e80), &(0x7f0000000ec0), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000f00)}}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x17c, 0x17c, 0xb, [@fwd={0x4}, @fwd={0x6}, @enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0x8, 0x100}, {0xa, 0x4}, {0xa, 0xe2}]}, @union={0xa, 0x5, 0x0, 0x5, 0x0, 0x800, [{0x0, 0x3, 0x7}, {0x9, 0x5, 0x7fff}, {0x4, 0x3, 0x7}, {0x2, 0x5, 0xffff}, {0xd, 0x5, 0x8000}]}, @union={0xf, 0x6, 0x0, 0x5, 0x0, 0x80, [{0xb, 0x5, 0xfffffffd}, {0x0, 0x1, 0x10001}, {0xb, 0x1, 0x80000001}, {0x2, 0x4, 0x6}, {0xb, 0x3}, {0x1, 0x0, 0x6}]}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x10001, [{0x0, 0x0, 0x3}, {0xc, 0x0, 0x8001}, {0xb, 0x5, 0x1}, {0x7}, {0x8, 0x0, 0x6}, {0x6, 0x0, 0x2}]}, @func={0xf, 0x0, 0x0, 0xc, 0x2}, @enum={0x8, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x55a}]}, @union={0x3, 0x2, 0x0, 0x5, 0x1, 0x3, [{0xf, 0x3, 0x2}, {0xd, 0x4, 0x48000000}]}, @typedef={0x5, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x0, 0x2e, 0x5f, 0x6f, 0x61, 0x61, 0x5f, 0x61, 0x61]}}, &(0x7f0000001240)=""/101, 0x19f, 0x65, 0x0, 0x3}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x30, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x100}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xb7b, 0x0, 0x0, 0x0, 0x1000}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xd03c}, @ldst={0x3, 0x1, 0x2, 0x0, 0xa, 0xffffffffffffff5e, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x7, 0x6, 0x3, 0x4, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x8, 0x8, &(0x7f00000004c0)=""/8, 0x41000, 0x55, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000001300)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000001340)={0x2, 0x7, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000001380)=[{0x1, 0x3, 0x1, 0x7}, {0x3, 0x3, 0x5, 0x6}, {0x2, 0x1, 0x5, 0x7}, {0x4, 0x1, 0x7, 0xa}, {0x3, 0x5, 0x5, 0x2}, {0x3, 0x5, 0x6, 0x1}, {0x4, 0x2, 0xf, 0xa}, {0x4, 0x5, 0x10, 0x8}, {0x1, 0x3, 0x3}, {0x2, 0x4, 0x7, 0x4}], 0x10, 0x4e}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0], 0x0, 0xfc, &(0x7f00000009c0)=[{}], 0x8, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c80)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001500)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x80}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d40)={0x6, 0x13, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000101007ca2b9a27a0100000000000900400018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000083000000bf090000000000005509010000000000950000000000000018450000ffffffff00000000000000008d0a02000800000085100000f9ffffffbf91000000000000b7020000020000008500000084000000b700000000000000950000a632610000000000"], &(0x7f00000008c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x22, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x1, 0x62a3748, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[r6]}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xd6, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x30}, 0x18) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r7, r1}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0x1}, &(0x7f0000000680), &(0x7f0000000700)=r7}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)={0x1b, 0x0, 0x0, 0x4, 0x0, r0, 0x4a2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0xe0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000e00)=[0x0], 0x0, 0x81, &(0x7f0000000e40)=[{}], 0x8, 0x10, &(0x7f0000000e80), &(0x7f0000000ec0), 0x8, 0x68, 0x8, 0x8, &(0x7f0000000f00)}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000012c0)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x17c, 0x17c, 0xb, [@fwd={0x4}, @fwd={0x6}, @enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0x8, 0x100}, {0xa, 0x4}, {0xa, 0xe2}]}, @union={0xa, 0x5, 0x0, 0x5, 0x0, 0x800, [{0x0, 0x3, 0x7}, {0x9, 0x5, 0x7fff}, {0x4, 0x3, 0x7}, {0x2, 0x5, 0xffff}, {0xd, 0x5, 0x8000}]}, @union={0xf, 0x6, 0x0, 0x5, 0x0, 0x80, [{0xb, 0x5, 0xfffffffd}, {0x0, 0x1, 0x10001}, {0xb, 0x1, 0x80000001}, {0x2, 0x4, 0x6}, {0xb, 0x3}, {0x1, 0x0, 0x6}]}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x10001, [{0x0, 0x0, 0x3}, {0xc, 0x0, 0x8001}, {0xb, 0x5, 0x1}, {0x7}, {0x8, 0x0, 0x6}, {0x6, 0x0, 0x2}]}, @func={0xf, 0x0, 0x0, 0xc, 0x2}, @enum={0x8, 0x1, 0x0, 0x6, 0x4, [{0x7, 0x55a}]}, @union={0x3, 0x2, 0x0, 0x5, 0x1, 0x3, [{0xf, 0x3, 0x2}, {0xd, 0x4, 0x48000000}]}, @typedef={0x5, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x0, 0x2e, 0x5f, 0x6f, 0x61, 0x61, 0x5f, 0x61, 0x61]}}, &(0x7f0000001240)=""/101, 0x19f, 0x65, 0x0, 0x3}, 0x20) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x30, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x100}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xb7b, 0x0, 0x0, 0x0, 0x1000}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0xd03c}, @ldst={0x3, 0x1, 0x2, 0x0, 0xa, 0xffffffffffffff5e, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x7, 0x6, 0x3, 0x4, 0x10}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}]}, &(0x7f0000000180)='GPL\x00', 0x8, 0x8, &(0x7f00000004c0)=""/8, 0x41000, 0x55, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000001300)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000001340)={0x2, 0x7, 0x5, 0x8001}, 0x10, 0x0, 0x0, 0xa, 0x0, &(0x7f0000001380)=[{0x1, 0x3, 0x1, 0x7}, {0x3, 0x3, 0x5, 0x6}, {0x2, 0x1, 0x5, 0x7}, {0x4, 0x1, 0x7, 0xa}, {0x3, 0x5, 0x5, 0x2}, {0x3, 0x5, 0x6, 0x1}, {0x4, 0x2, 0xf, 0xa}, {0x4, 0x5, 0x10, 0x8}, {0x1, 0x3, 0x3}, {0x2, 0x4, 0x7, 0x4}], 0x10, 0x4e}, 0x90) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={0xffffffffffffffff, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000980)=[0x0, 0x0, 0x0], 0x0, 0xfc, &(0x7f00000009c0)=[{}], 0x8, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000c80)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001500)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x80}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d40)={0x6, 0x13, &(0x7f0000001580)=ANY=[@ANYBLOB="180000000101007ca2b9a27a0100000000000900400018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000083000000bf090000000000005509010000000000950000000000000018450000ffffffff00000000000000008d0a02000800000085100000f9ffffffbf91000000000000b7020000020000008500000084000000b700000000000000950000a632610000000000"], &(0x7f00000008c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x22, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0x1, 0x62a3748, 0x8001}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d00)=[r6]}, 0x90) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x4}, 0x48) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0xd6, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000540)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x30}, 0x18) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r7, r1}, 0xc) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{0x1}, &(0x7f0000000680), &(0x7f0000000700)=r7}, 0x20) (async) 01:26:21 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0xa, &(0x7f00000006c0), 0x4) 01:26:21 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {0x0}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:21 executing program 0: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, &(0x7f0000000800)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0], 0x0, 0x45, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x44, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000340)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000380)=[0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0], 0x0, 0x7f, &(0x7f0000000400)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x82, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={@ifindex, 0x35, 0x0, 0x5, &(0x7f0000000640)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000006c0)=[0x0, 0x0, 0x0], &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780)={@ifindex=r0, r1, 0x24, 0x20, 0x0, @prog_id=r2, r3}, 0x20) 01:26:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:21 executing program 3: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) 01:26:21 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0xb, &(0x7f00000006c0), 0x4) 01:26:21 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r0, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:21 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {0x0}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:21 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0xa68d588fc7e4b720) 01:26:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:22 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0xa68d588fc7e4b720) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0xa68d588fc7e4b720) (async) 01:26:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:22 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) 01:26:22 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, r0, 0xfbfffffd, 0x2, 0x5}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x58, &(0x7f0000000080)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2, 0x8, 0x10}, 0xc) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)={0x2}, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='devices.list\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00'}, 0x18) 01:26:22 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) 01:26:22 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r0, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:22 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {0x0}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:22 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', 0x0, r0, 0xfbfffffd, 0x2, 0x5}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x58, &(0x7f0000000080)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2, 0x8, 0x10}, 0xc) (async) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)={0x2}, 0x8) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240)={r3, 0xffffffffffffffff}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) (async) r5 = openat$cgroup_ro(r4, &(0x7f0000000300)='devices.list\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x2) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@generic={&(0x7f00000001c0)='./file0\x00'}, 0x18) 01:26:22 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) (async) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r1}) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) 01:26:22 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x6, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:23 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {0x0}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:23 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000002c0)={r1}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r0}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)='%-010d \x00'}, 0x20) 01:26:23 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, 0x0}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:23 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)) 01:26:23 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:23 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x26) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={&(0x7f0000000080)="f038404b3ccf3c9123661e9ff179d13f9d318e5de975dd70ff6889cf5521878272ec8591afccb3d6e4a109fc", &(0x7f00000000c0)=""/241, &(0x7f00000001c0)="194cb3d6bcd1fe3d73efd0acbd9e678eeb4ba789984faaddd585764cd88b713440038f74b5745524ff16c1e272dee738ba8db5a700176b8abf90726bcffa174be4498a551f2c168ab88fd4b4911584eb564d72788b0ee1ade51e18a116df51a55e5825caaa4b24f6f5355eabc1a0ba8a433c4700850acfe3297f8259c402da15659d0a26a1cfe0d187de2ffba7bcc18d2f3139df32824e96cd13683d2a49dfa7d7a3dbb043001cd5eb769d", &(0x7f0000000280)="b6d67b213cb62d131196927182c87a99ae1add07beb802b91e3891f1fead63", 0xe4b, r0, 0x4}, 0x38) 01:26:23 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x57, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x18) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000007c0)=[0x0], &(0x7f0000000800)=[0x0, 0x0], 0x0, 0xc4, &(0x7f0000000840)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x1c, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x9, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0xb}, @exit, @call={0x85, 0x0, 0x0, 0xce}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0xc1}], &(0x7f0000000140)='syzkaller\x00', 0xfffffff9, 0x13, &(0x7f0000000180)=""/19, 0x40f00, 0x73, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000004c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x1, 0x6, 0x7}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000005c0)=[r0, r4, r5, r0, r0], &(0x7f0000000600)=[{0x1, 0x1, 0x6, 0x2}, {0x1, 0x4, 0xb, 0x9}, {0x4, 0x1, 0x10, 0xb}, {0x2, 0x2, 0x1, 0x2}, {0x1, 0x2, 0x6}, {0x1, 0x4, 0xa, 0xc}], 0x10, 0x5}, 0x90) 01:26:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, 0x0}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:24 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x6, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:24 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000080)='tasks\x00', 0x2, 0x0) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)) 01:26:24 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x57, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) (async, rerun: 32) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) (rerun: 32) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x18) (async, rerun: 64) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) (rerun: 64) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f00000007c0)=[0x0], &(0x7f0000000800)=[0x0, 0x0], 0x0, 0xc4, &(0x7f0000000840)=[{}], 0x8, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x1c, 0x8, 0x8, &(0x7f0000000900)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x9, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0xa, 0x5, 0x0, 0xb}, @exit, @call={0x85, 0x0, 0x0, 0xce}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @call={0x85, 0x0, 0x0, 0xc1}], &(0x7f0000000140)='syzkaller\x00', 0xfffffff9, 0x13, &(0x7f0000000180)=""/19, 0x40f00, 0x73, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000004c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x2, 0x1, 0x6, 0x7}, 0x10, 0x0, 0x0, 0x6, &(0x7f00000005c0)=[r0, r4, r5, r0, r0], &(0x7f0000000600)=[{0x1, 0x1, 0x6, 0x2}, {0x1, 0x4, 0xb, 0x9}, {0x4, 0x1, 0x10, 0xb}, {0x2, 0x2, 0x1, 0x2}, {0x1, 0x2, 0x6}, {0x1, 0x4, 0xa, 0xc}], 0x10, 0x5}, 0x90) 01:26:24 executing program 4: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)) 01:26:24 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x26) (async) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000002c0)={&(0x7f0000000080)="f038404b3ccf3c9123661e9ff179d13f9d318e5de975dd70ff6889cf5521878272ec8591afccb3d6e4a109fc", &(0x7f00000000c0)=""/241, &(0x7f00000001c0)="194cb3d6bcd1fe3d73efd0acbd9e678eeb4ba789984faaddd585764cd88b713440038f74b5745524ff16c1e272dee738ba8db5a700176b8abf90726bcffa174be4498a551f2c168ab88fd4b4911584eb564d72788b0ee1ade51e18a116df51a55e5825caaa4b24f6f5355eabc1a0ba8a433c4700850acfe3297f8259c402da15659d0a26a1cfe0d187de2ffba7bcc18d2f3139df32824e96cd13683d2a49dfa7d7a3dbb043001cd5eb769d", &(0x7f0000000280)="b6d67b213cb62d131196927182c87a99ae1add07beb802b91e3891f1fead63", 0xe4b, r0, 0x4}, 0x38) 01:26:24 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) 01:26:24 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:24 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, 0x0}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:24 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)='%+9llu \x00'}, 0x20) 01:26:25 executing program 0: bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={0x1}, 0x4) socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)) 01:26:25 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x6, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:25 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:25 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{0x0}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:25 executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) 01:26:25 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:25 executing program 4: socketpair(0x21, 0x4, 0x0, &(0x7f0000000280)) 01:26:25 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)='%+9llu \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x4}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r0}, &(0x7f0000000080), &(0x7f00000000c0)='%+9llu \x00'}, 0x20) (async) 01:26:25 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:26 executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = getpid() openat$cgroup_subtree(r6, &(0x7f0000000980), 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, r7, 0xe, r6, 0x8) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x18) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x4ef7f2e, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x19, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x5, 0x6, 0x4, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x52c6}, @generic={0x70, 0x9, 0x2, 0x3, 0x9}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1f}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x6e, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0x80, 0x28}, 0xff06, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[r3, r4, r5, r6, r8, r9], &(0x7f0000000700)=[{0x4, 0x4, 0x7}, {0x4, 0x2, 0xc, 0x1}, {0x5, 0x4, 0xc, 0x7}, {0x5, 0x1, 0xf, 0x9}, {0x4, 0x1, 0x6, 0xa}, {0x0, 0x5, 0x7}]}, 0x90) 01:26:26 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) 01:26:26 executing program 1: socketpair(0x0, 0x4, 0x0, &(0x7f0000000280)) 01:26:26 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{0x0}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:26 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:26 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{0x0}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:26 executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) 01:26:26 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = getpid() openat$cgroup_subtree(r6, &(0x7f0000000980), 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, r7, 0xe, r6, 0x8) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x18) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x4ef7f2e, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x19, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x5, 0x6, 0x4, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x52c6}, @generic={0x70, 0x9, 0x2, 0x3, 0x9}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1f}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x6e, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0x80, 0x28}, 0xff06, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[r3, r4, r5, r6, r8, r9], &(0x7f0000000700)=[{0x4, 0x4, 0x7}, {0x4, 0x2, 0xc, 0x1}, {0x5, 0x4, 0xc, 0x7}, {0x5, 0x1, 0xf, 0x9}, {0x4, 0x1, 0x6, 0xa}, {0x0, 0x5, 0x7}]}, 0x90) 01:26:27 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:27 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{0x0}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:27 executing program 2: socketpair(0x0, 0x4, 0x0, &(0x7f0000000280)) 01:26:27 executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = getpid() openat$cgroup_subtree(r6, &(0x7f0000000980), 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, r7, 0xe, r6, 0x8) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x18) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x4ef7f2e, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x19, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x5, 0x6, 0x4, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x52c6}, @generic={0x70, 0x9, 0x2, 0x3, 0x9}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1f}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x6e, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0x80, 0x28}, 0xff06, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[r3, r4, r5, r6, r8, r9], &(0x7f0000000700)=[{0x4, 0x4, 0x7}, {0x4, 0x2, 0xc, 0x1}, {0x5, 0x4, 0xc, 0x7}, {0x5, 0x1, 0xf, 0x9}, {0x4, 0x1, 0x6, 0xa}, {0x0, 0x5, 0x7}]}, 0x90) 01:26:27 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:27 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:28 executing program 3: socketpair(0x0, 0x4, 0x0, &(0x7f0000000280)) 01:26:28 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = getpid() openat$cgroup_subtree(r6, &(0x7f0000000980), 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, r7, 0xe, r6, 0x8) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x18) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x4ef7f2e, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x19, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x5, 0x6, 0x4, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x52c6}, @generic={0x70, 0x9, 0x2, 0x3, 0x9}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1f}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x6e, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0x80, 0x28}, 0xff06, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[r3, r4, r5, r6, r8, r9], &(0x7f0000000700)=[{0x4, 0x4, 0x7}, {0x4, 0x2, 0xc, 0x1}, {0x5, 0x4, 0xc, 0x7}, {0x5, 0x1, 0xf, 0x9}, {0x4, 0x1, 0x6, 0xa}, {0x0, 0x5, 0x7}]}, 0x90) 01:26:28 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:28 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:28 executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r1, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r3 = getpid() openat$cgroup_subtree(r2, &(0x7f0000000980), 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, r3, 0xe, r2, 0x8) 01:26:28 executing program 0: socketpair(0x21, 0x0, 0x0, &(0x7f0000000280)) 01:26:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{0x0}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:29 executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:29 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r1, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, r3, 0xe, r2, 0x8) 01:26:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:29 executing program 2: socketpair(0x21, 0x0, 0x0, 0x0) 01:26:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{0x0}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:29 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:29 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:29 executing program 4: socketpair(0x21, 0x0, 0x0, 0x0) 01:26:30 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r1, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, r2, 0x8) 01:26:30 executing program 0: perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) [ 776.245712][ T154] device hsr_slave_0 left promiscuous mode 01:26:30 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:30 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r1, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, r2, 0x8) 01:26:30 executing program 2: socketpair(0x21, 0x0, 0x0, 0x0) [ 776.681791][ T154] device hsr_slave_1 left promiscuous mode 01:26:30 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:30 executing program 1: perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:31 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:31 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r1, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:31 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) [ 777.147250][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 777.154709][ T154] batman_adv: batadv0: Removing interface: batadv_slave_0 01:26:31 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) [ 777.420725][ T154] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 777.449524][ T154] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 777.514664][ T154] device bridge_slave_1 left promiscuous mode [ 777.525390][ T154] bridge0: port 2(bridge_slave_1) entered disabled state 01:26:31 executing program 0: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r1, 0x58, &(0x7f00000008c0)}, 0x10) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:31 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") [ 777.931755][ T154] device bridge_slave_0 left promiscuous mode [ 777.939554][ T154] bridge0: port 1(bridge_slave_0) entered disabled state 01:26:32 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:32 executing program 3: perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:32 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:32 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:32 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:32 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:32 executing program 0: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:32 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{0x0}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:33 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:33 executing program 4: perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd0", 0x3b}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:33 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) [ 779.519809][ T154] device veth1_macvtap left promiscuous mode [ 779.525891][ T154] device veth0_macvtap left promiscuous mode [ 779.577191][ T154] device veth1_vlan left promiscuous mode [ 779.583050][ T154] device veth0_vlan left promiscuous mode 01:26:33 executing program 3: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:33 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x0) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:33 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd0", 0x3b}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:33 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:34 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:34 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd0", 0x3b}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:34 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:34 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:34 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x0) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:34 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b", 0x58}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:35 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:35 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") sendmsg$unix(r2, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:35 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b", 0x58}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:36 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:36 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd0", 0x3b}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:36 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x0) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:36 executing program 0: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:36 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:36 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b", 0x58}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:37 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b", 0x58}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:37 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:37 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x0, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x40) 01:26:37 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f", 0x67}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:37 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd0", 0x3b}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:37 executing program 4: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:38 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x0, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:38 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f", 0x67}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:38 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd0", 0x3b}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:38 executing program 3: perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:38 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x40) 01:26:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x0, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:39 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f", 0x67}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:39 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x40) 01:26:39 executing program 4: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:39 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0x58, &(0x7f00000008c0)}, 0x10) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = getpid() openat$cgroup_subtree(r6, &(0x7f0000000980), 0x2, 0x0) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, r7, 0xe, r6, 0x8) r8 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x18) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x4ef7f2e, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x19, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x5, 0x6, 0x4, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x52c6}, @generic={0x70, 0x9, 0x2, 0x3, 0x9}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1f}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x6e, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0x80, 0x28}, 0xff06, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[r3, r4, r5, r6, r8, r9], &(0x7f0000000700)=[{0x4, 0x4, 0x7}, {0x4, 0x2, 0xc, 0x1}, {0x5, 0x4, 0xc, 0x7}, {0x5, 0x1, 0xf, 0x9}, {0x4, 0x1, 0x6, 0xa}, {0x0, 0x5, 0x7}]}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) (async) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x131, 0x131, 0x5, [@restrict={0xd, 0x0, 0x0, 0xb, 0x4}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0x1, 0x5, 0x81}, {0x5, 0x0, 0x7fff}, {0x6, 0x5, 0x2f}, {0xa, 0x4, 0x8}, {0xa, 0x1, 0x3}, {0xf, 0x0, 0x3}, {0x4, 0x5, 0x6cfb9628}, {0x7, 0x2, 0x8}]}, @var={0x5, 0x0, 0x0, 0xe, 0x4, 0x1}, @datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x8001, 0x10001}, {0x4, 0x7151, 0x4}, {0x5, 0x3, 0x1ff}, {0x2, 0x9, 0x1000}, {0x4, 0x801, 0x1}, {0x4, 0x7, 0x4}, {0x2, 0x0, 0x3f}, {0x5, 0x3, 0x81}], ']'}, @struct={0x4, 0x1, 0x0, 0x4, 0x1, 0x7fffffff, [{0x9, 0x3, 0x4}]}, @enum={0x4, 0x3, 0x0, 0x6, 0x4, [{0xd, 0x3}, {0x0, 0xfffffffd}, {0x10, 0x9c0}]}]}, {0x0, [0x61, 0x2e, 0x0]}}, &(0x7f0000000380)=""/162, 0x151, 0xa2, 0x0, 0x800}, 0x20) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0xd313, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000940)={r5, 0x58, &(0x7f00000008c0)}, 0x10) (async) openat$cgroup_procs(r5, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) (async) openat$cgroup_procs(r6, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) getpid() (async) openat$cgroup_subtree(r6, &(0x7f0000000980), 0x2, 0x0) (async) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, r7, 0xe, r6, 0x8) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)=@o_path={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x18) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x4ef7f2e, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x3}, 0x48) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x19, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @generic={0x0, 0x5, 0x6, 0x4, 0x9}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x52c6}, @generic={0x70, 0x9, 0x2, 0x3, 0x9}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x1f}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x3}]}, &(0x7f0000000100)='GPL\x00', 0x100, 0x0, 0x0, 0x40f00, 0x6e, '\x00', r1, 0x0, r2, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0xb, 0x80, 0x28}, 0xff06, 0x0, 0x0, 0x6, &(0x7f00000006c0)=[r3, r4, r5, r6, r8, r9], &(0x7f0000000700)=[{0x4, 0x4, 0x7}, {0x4, 0x2, 0xc, 0x1}, {0x5, 0x4, 0xc, 0x7}, {0x5, 0x1, 0xf, 0x9}, {0x4, 0x1, 0x6, 0xa}, {0x0, 0x5, 0x7}]}, 0x90) (async) 01:26:39 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5", 0x6e}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:40 executing program 2: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:40 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="cefceb5bd0924abe086d8b87cc76e0612dccca73dd1313091cc4fb6c018f37011b1abafd6ab6580396fa59d219f5c92125520b0ba0ff3aa9e13a6671353048a94c8809df34f9ba9b02db1372d27199afe67a09dc620d468dda61a96001a1241dd9f96769a1b965c51eb4e73fada872c22c8c01bfee5bcd6ae5e29aa6695dc41916f0904b9915e098f973442c0089acfb627111ce761c64cb41d00a1587aab8bf7460090b3fc0b5d4b06777ebf674498f5936276de8ad6488a344685c65d0079ff0817aa3d9c57c445ba27220b216f950495294980fc99ed0241678662ba6afb6036656ea7a7a45fb4a919efd762ab16a73317a5c9a4de7be05a9", 0xfa}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="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", 0xccf}], 0x3}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x0, r0}, 0x18) 01:26:40 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:40 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:40 executing program 0: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:40 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5", 0x6e}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:41 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000280)="8cf04f2b49d5fea19d145d2ccdaf619755246e8778ee9edb6b7815100bd4758124e4e5c6f48954de7bde8e9a6da4edd45d8fc7ac0d31a839eb2f03f5dd4a17585825d4966ce38e18e155544a38870283e2622fff9460c1b819001fa2e562c6b099cafbc6e227c36c339366376180d37e886e45661b3c2653c27e", 0x7a}, {&(0x7f0000000300)="2e2c60a3c186b6fe8c1fb91cd8932085509aa82e777eaa3c4961bb0aecff276729035af2913db8d27aa137ca83176beb7417ad81c1b09886e03252817588ef23437aebbd2691f1dd4195b6d11de5aaaa798a7e9ef979a80f8dbd73668b396c23f85059612a6219586384f9b736ce58e47db3795c73264898da95403798d6f6", 0x7f}, {&(0x7f0000000380)="c2509b11fdc51f26c1eb6375f037d6792883f70c606351254125e874de80de1239a7606d42d6f24dcabb65639092f93175806d86d54c2423a92d20a3b1a70b184b4eb390b33dd84516274bb742bc0bc6c1881a67dd07fd3d708bb46ffcfea5ff88853d3e6e28ab4791495fb6bf4d3085927da55673acd6386521dba301725d020fcf8f572efe4eb548f9099cce6f4e00f8be5b2fc13ff6f816ec3b18cd19c01a999c050f630de21cf963889119acd589fb391d5ab8edad6a13d220f8cc56a1360b0a8c29ae0069f282a992962e3692661c4ba1147d5dfcf90de36e2ff353bd9d9cee18021283855f629b27724786e453d234378110b4297e17", 0xf9}, {&(0x7f0000000480)="cbadf0f588fa247d9260a00a8f869013148ccc5e7fb03c2733a3222d0adc81e7917a7b9e1c8fd33a0173c9042ff63d75f75a279c26c6f4eadc70f4acffb0d44d814f6ceef530d6a82556b911e06b37a883755b8e4b2813a679c65ed7224fa5cf1b72038653b1d7", 0x67}], 0x4, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:41 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, 0x0, 0x40) 01:26:41 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x3, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5", 0x6e}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:41 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:41 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:42 executing program 4: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x81, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:42 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.io_merged\x00', 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="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", 0xfa}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="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", 0xccf}], 0x3}, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x0, r0}, 0x18) 01:26:42 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:42 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837c", 0x72}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:42 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480), 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:43 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0xc1, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:43 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480), 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:43 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837c", 0x72}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:43 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480), 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:43 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:43 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:43 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480), 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:44 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837c", 0x72}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:44 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:44 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:44 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837c", 0x72}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:44 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:44 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:44 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2", 0x3f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:44 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:45 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be", 0x74}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:45 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:26:45 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:26:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:45 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2", 0x3f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:45 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be", 0x74}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:45 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:46 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:26:46 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2", 0x3f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:46 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be", 0x74}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:46 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:46 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:46 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:46 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:26:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:47 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x0) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:47 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5", 0x5f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0xf0}, 0x40) 01:26:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:47 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:47 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x0) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:48 executing program 2: perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:48 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:48 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0xd8}, 0x40) [ 794.442893][ T154] team0 (unregistering): Port device team_slave_1 removed 01:26:48 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5", 0x5f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:48 executing program 1: perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:49 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x0) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") [ 795.001667][ T154] team0 (unregistering): Port device team_slave_0 removed 01:26:49 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5", 0x5f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:49 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:49 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:49 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}], 0xd8}, 0x40) 01:26:49 executing program 2: perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) [ 795.753635][ T154] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 01:26:49 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:49 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x0, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:50 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b99", 0x6f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:50 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:50 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:50 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0xb8}, 0x40) [ 796.578591][ T154] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 01:26:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:50 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x0, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b99", 0x6f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:50 executing program 4: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:51 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0xb8}, 0x40) 01:26:51 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:51 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x0, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:51 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:51 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b99", 0x6f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:52 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:52 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}], 0xb8}, 0x40) 01:26:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:52 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:52 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc6", 0x77, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:52 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:53 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:53 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}], 0x98}, 0x40) 01:26:53 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:53 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc6", 0x77, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:53 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:53 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:53 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}], 0x98}, 0x40) 01:26:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:54 executing program 4: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) [ 800.109003][ T154] bond0 (unregistering): Released all slaves 01:26:54 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc6", 0x77, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:54 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}], 0x78}, 0x40) 01:26:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:54 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc", 0x7b, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:55 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:55 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540), 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}], 0x40}, 0x40) 01:26:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:55 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc", 0x7b, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:56 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:56 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:56 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540), 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:56 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}], 0x40}, 0x40) 01:26:56 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:56 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:56 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:57 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc", 0x7b, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:57 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:57 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540), 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}], 0x40}, 0x40) 01:26:57 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:57 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e04", 0x7d, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:58 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x34, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1]}}], 0x78}, 0x40) 01:26:58 executing program 4: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:58 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb", 0x55, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:59 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e04", 0x7d, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:26:59 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb", 0x55, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:26:59 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:59 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:26:59 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff]}}], 0x70}, 0x40) 01:26:59 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:26:59 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:00 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb", 0x55, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:00 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e04", 0x7d, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff]}}], 0x70}, 0x40) 01:27:00 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:00 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f", 0x7f, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:00 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff]}}], 0x70}, 0x40) 01:27:01 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, 0x0, &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:01 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:01 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:01 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0]}}], 0x70}, 0x40) 01:27:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f", 0x7f, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:02 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:02 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, 0x0, &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:02 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:02 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) [ 808.659365][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.665785][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 01:27:02 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) 01:27:03 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:03 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, 0x0, &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:03 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:03 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f", 0x7f, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:04 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:04 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:04 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), 0x0, &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:04 executing program 4: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6e203ed1}, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) [ 810.737272][ T40] Bluetooth: hci1: command 0x0406 tx timeout 01:27:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc04", 0x94, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:05 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:05 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2800, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:05 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), 0x0, &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:06 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) 01:27:06 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:06 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc04", 0x94, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:06 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:06 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:07 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:07 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), 0x0, &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}], 0x70}, 0x40) 01:27:07 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:07 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc04", 0x94, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:08 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 01:27:08 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), 0x0) openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:08 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:08 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}], 0x70}, 0x40) 01:27:08 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:08 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b8", 0x9f, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:08 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:27:09 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:09 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:09 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), 0x0) openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:09 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}, @rights={{0x20, 0x1, 0x1, [r0, r1, 0xffffffffffffffff, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c}}], 0x110}, 0x40) 01:27:09 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}], 0x70}, 0x40) 01:27:09 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:10 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b8", 0x9f, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:10 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), 0x0) openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:10 executing program 4: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000, 0x0, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:10 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) 01:27:10 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:27:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b8", 0x9f, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:11 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)) openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:11 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:11 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:27:12 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) 01:27:12 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:12 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:12 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e05", 0xa4, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:12 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)) openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:12 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:12 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:13 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) 01:27:13 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e05", 0xa4, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:27:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:13 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)) openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:14 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:14 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e05", 0xa4, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:27:14 executing program 4: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 01:27:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}], 0x70}, 0x40) 01:27:15 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:15 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7, 0xffffffffffffffff, 0x8) 01:27:15 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8", 0xa7, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:15 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:27:15 executing program 0: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:27:15 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 01:27:15 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) 01:27:16 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8", 0xa7, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:16 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:16 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x844f2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:27:17 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) 01:27:17 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5", 0x5f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:18 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8", 0xa7, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:18 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) 01:27:18 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:19 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe", 0xa8, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:19 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5", 0x5f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:19 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x70}, 0x40) 01:27:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b99", 0x6f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:20 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:21 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe", 0xa8, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:21 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) 01:27:21 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe", 0xa8, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:22 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) [ 829.041757][ T9994] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 01:27:23 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, 0x0, &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:23 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc6", 0x77, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:23 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) 01:27:24 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, 0x0, &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:24 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff, r1, r1]}}], 0x78}, 0x40) [ 830.852145][ T9994] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 01:27:24 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) [ 832.011601][ T9994] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.954374][ T9994] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 843.655065][ T9994] device hsr_slave_0 left promiscuous mode [ 843.699020][ T9994] device hsr_slave_1 left promiscuous mode [ 843.820450][ T9994] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 843.828398][ T9994] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 843.895864][ T9994] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 843.937336][ T9994] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 844.005178][ T9994] device bridge_slave_1 left promiscuous mode [ 844.037302][ T9994] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.343253][ T9994] device bridge_slave_0 left promiscuous mode [ 844.361021][ T9994] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.983561][ T9994] device veth1_macvtap left promiscuous mode [ 845.021911][ T9994] device veth0_macvtap left promiscuous mode [ 845.057422][ T9994] device veth1_vlan left promiscuous mode [ 845.063350][ T9994] device veth0_vlan left promiscuous mode 01:27:40 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, 0x0, &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") [ 846.577236][T18818] Bluetooth: hci5: command 0x0406 tx timeout 01:27:40 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x40) 01:27:40 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) 01:27:40 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc", 0x7b, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:40 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:41 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:27:41 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540), 0x0, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:41 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e5") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:41 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), 0x0, &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:42 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, r0, 0xffffffffffffffff]}}], 0x70}, 0x40) 01:27:42 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e5") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:42 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f", 0x7f, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:43 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), 0x0, &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:43 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) 01:27:43 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e5") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:44 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) [ 850.817202][ T21] Bluetooth: hci2: command 0x0409 tx timeout [ 850.823434][ T21] Bluetooth: hci3: command 0x0409 tx timeout 01:27:44 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), 0x0, &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:44 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}], 0x70}, 0x40) 01:27:45 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:45 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), 0x0) 01:27:46 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b8", 0x9f, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:46 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) [ 852.897152][T18818] Bluetooth: hci3: command 0x041b tx timeout [ 852.903426][T18818] Bluetooth: hci2: command 0x041b tx timeout 01:27:47 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:47 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) 01:27:48 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), 0x0) 01:27:48 executing program 3: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:48 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e05", 0xa4, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") [ 854.977237][ T21] Bluetooth: hci2: command 0x040f tx timeout [ 854.996173][ T21] Bluetooth: hci3: command 0x040f tx timeout 01:27:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:49 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0]}}], 0x70}, 0x40) 01:27:49 executing program 2: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:50 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), 0x0) 01:27:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:50 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c22") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) [ 857.057149][ T21] Bluetooth: hci3: command 0x0419 tx timeout [ 857.063437][ T21] Bluetooth: hci2: command 0x0419 tx timeout 01:27:51 executing program 3: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:51 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) 01:27:51 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:52 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c22") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:53 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:53 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) 01:27:53 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) 01:27:54 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c22") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:54 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) 01:27:55 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5", 0x5f, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:55 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:55 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50") [ 861.717167][ T9994] team0 (unregistering): Port device team_slave_1 removed 01:27:56 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:56 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50") 01:27:56 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:56 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) [ 862.867785][ T9994] team0 (unregistering): Port device team_slave_0 removed 01:27:57 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe", 0xa8, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") 01:27:57 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50") 01:27:57 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) [ 864.329939][ T9994] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 01:27:58 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:27:58 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:27:59 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff, r0]}}], 0x68}, 0x40) [ 865.536610][ T9994] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 01:27:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32") 01:28:00 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:28:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:00 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32") 01:28:01 executing program 1: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:28:03 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:03 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 01:28:03 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, 0x0, &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") [ 870.099026][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 870.105363][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 01:28:04 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32") 01:28:04 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:04 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x8) [ 871.078722][ T9994] bond0 (unregistering): Released all slaves 01:28:05 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e5") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68") 01:28:06 executing program 2: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 01:28:06 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:07 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), 0x0, &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68571f40ffeb") [ 874.076240][T29801] chnl_net:caif_netlink_parms(): no params data found 01:28:08 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32ff03e54b68") 01:28:08 executing program 3: perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1628, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:28:09 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$unix(r2, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x20, 0x1, 0x1, [r1, r1, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3, 0xee00, 0xee00}}}, @rights={{0x28, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}}], 0x68}, 0x40) 01:28:09 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) getpid() syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, 0x0, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:10 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee64357e2c32") 01:28:10 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), 0x0) [ 877.083849][T29800] chnl_net:caif_netlink_parms(): no params data found [ 877.134145][T29801] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.150126][T29801] bridge0: port 1(bridge_slave_0) entered disabled state [ 877.163903][T29801] device bridge_slave_0 entered promiscuous mode 01:28:11 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), 0x0) [ 877.198531][T29801] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.206595][T29801] bridge0: port 2(bridge_slave_1) entered disabled state [ 877.215810][T29801] device bridge_slave_1 entered promiscuous mode 01:28:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee") 01:28:11 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e") openat$cgroup(r0, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) [ 878.201519][T29801] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 01:28:12 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) getpid() syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, 0x0, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:13 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50") [ 879.461320][T29801] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:28:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe5029") 01:28:15 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(0xffffffffffffffff, &(0x7f0000000780)='syz1\x00', 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) [ 881.736695][T29800] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.744155][T29800] bridge0: port 1(bridge_slave_0) entered disabled state [ 881.783119][T29800] device bridge_slave_0 entered promiscuous mode 01:28:15 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) getpid() syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, 0x0, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:16 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0") [ 882.747186][T29800] bridge0: port 2(bridge_slave_1) entered blocking state [ 882.767491][T29800] bridge0: port 2(bridge_slave_1) entered disabled state [ 882.775689][T29800] device bridge_slave_1 entered promiscuous mode 01:28:17 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) [ 884.402041][T29801] team0: Port device team_slave_0 added [ 884.833077][T29800] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 884.901707][T29801] team0: Port device team_slave_1 added 01:28:19 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) [ 885.670154][T29800] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:28:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6b") [ 887.062279][T29801] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 887.069325][T29801] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 887.140391][T29801] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active 01:28:21 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:21 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) [ 888.051396][T29801] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 888.099185][T29801] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 888.240053][T29801] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 888.327500][T29800] team0: Port device team_slave_0 added 01:28:23 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b") [ 889.230156][T29800] team0: Port device team_slave_1 added 01:28:23 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), 0x0) [ 891.985670][T30168] cgroup: fork rejected by pids controller in /syz2 01:28:26 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04") [ 892.888583][T29801] device hsr_slave_0 entered promiscuous mode [ 892.906896][T29801] device hsr_slave_1 entered promiscuous mode [ 893.359930][T29801] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 893.382207][T29801] Cannot create hsr debugfs directory [ 893.408157][T29800] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 893.415149][T29800] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 893.527063][T29800] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 893.569409][T29800] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 893.576399][T29800] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 893.710619][T29800] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 01:28:28 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) getpid() syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, 0x0, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:30 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="92") 01:28:30 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:31 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0aa80fe50290d433ff5ee") [ 897.710768][T29800] device hsr_slave_0 entered promiscuous mode 01:28:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)) [ 897.889997][T29800] device hsr_slave_1 entered promiscuous mode [ 897.928249][T29800] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 897.935985][T29800] Cannot create hsr debugfs directory 01:28:32 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:33 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0") 01:28:34 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:34 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, 0x0, 0x0, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:36 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6b") 01:28:36 executing program 3: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, 0x0, 0x0, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:36 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), 0x0) [ 903.893689][T29801] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 01:28:38 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:38 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:39 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:39 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0") [ 906.013523][T30312] chnl_net:caif_netlink_parms(): no params data found [ 906.017101][ T1069] Bluetooth: hci4: command 0x0409 tx timeout 01:28:41 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000030c0)={&(0x7f0000000e00)=@abs, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/56, 0x38}, {&(0x7f0000001ec0)=""/4096, 0x1000}, {&(0x7f0000002ec0)=""/82, 0x52}, {&(0x7f0000002f40)=""/49, 0x31}, {&(0x7f0000002f80)=""/6, 0x6}], 0x6, &(0x7f0000003040)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}, 0x42) r5 = socket$kcm(0x29, 0x5, 0x0) getpid() sendmsg$unix(r4, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}], 0x38}, 0x0) recvmsg$unix(r4, &(0x7f0000000dc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000d00)=[{&(0x7f0000000840)=""/44, 0x2c}, {&(0x7f0000000880)=""/132, 0x84}, {&(0x7f0000000940)=""/83, 0x53}, {&(0x7f00000009c0)=""/132, 0x84}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/143, 0x8f}, {&(0x7f0000000c40)=""/169, 0xa9}], 0x7, &(0x7f0000000d80)=[@cred={{0x1c}}], 0x20}, 0x40000040) r6 = getpid() r7 = syz_clone(0x280400, &(0x7f0000000480)="5831fdc8fbfe75874a00907c1a86dd030109da378fc99934b546aaa05b7e2c8d30c912cf5ff13f4392b7c62798fed39153518ce044a2456f4a7289df8f7aa2136e06fcce7ff602539ae006defb9876dbac5ef9b8658a82d28317b04cfba0c5085d3c9b9ae14490b3579484bf148b9980f7b78b2db54cc68f3829cc2e0421", 0x7e, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000600)="0a7e9cd4db373cc4456abd5b97cb94e7475058cc33fbe4a0a993f7f82733ddb58d925bb550a937995c2fb445621a104a152e7ea82f86789b0ec9de207a4a6a8f2de908cf53a6cc9d84707d7ec84a1c01aa1fcb5bdb1fac9d25f34625e59ec42e7c229e") openat$cgroup(r0, 0x0, 0x200002, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000240)="f759f41db687b4bb7cd0915dcf61af9b9cf7591bac4022af9a54d37ce1f5ddc557783bbf56f85bee33f6ba7646ec2b7219f9e23fb87b9a1e1ff1b30cc33f6a8544b6099b6ee56683f909e1ac4ac9c51e3181ffefd9e5a5c2aef6d9d8decd3216dabb94c58a2c8e59372265e0a6928d8d9a0c77c5fee2ef4bb3d7fab87048fb32c2dab670b5c5cfb1b77011f54f88f56e74e1434d3e", 0x95}, {&(0x7f0000000000)="418ccd10be0ef1d67dd49a232948b12423f0bcebe607c35fdfde5a5283ef0da6c6e764246d", 0x25}, {&(0x7f0000000300)="b65f09b0a432b51765e9788200956ae8f2fafae1247511b5422f3951bb4fc930f26b6c9b1093c153d47832636c4209956dfe2ab5054fd098024be629a8f4ee99318ede82bc2a020eba875a2b74c12fc910156338e0f9df4e1514ea7775d212834dfe8f4401821a6e6f17e4ab369d5d6d39e66059c22aadc4f07120d4f306b9359d76523e70ef096979365a4ce4f3d48764b5a62d80ee83cf90ad544358441ac5287208ce3b0e52e8c2b18b2b51d69d5ea742c4c49d7cf2b4057cfaa9f7bba4afc2ef010ef360d1e7ddc4d67e69cb564cff7dffc67e31bcbceb45864bf3618bfc", 0xe0}], 0x3, &(0x7f0000003100)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee00, @ANYRES32, @ANYBLOB="00839c410000000061829699a87f89197ab6f2da67658834d72c07c3c0e499c3002810c2f2f679d7eaa22a817159c3deecbed0602ec7227df4dc749b8f31527b44a6d78415eb1c7053c815dc0e87aaa7edb0edb944508b3c8b59dffe83c2b5d1b22a2ce5b778f41117151fda7f7959a5214f35a8a7748e677e52b4c66425effd0089cc85b3bbb77d8446b81cac5f3c6fe65a20bddd756e1bee5360e59724653a8f5b2ca0cba3908b2e1f82d60b3e5985910b3a3c2713021be04684", @ANYRES32=r6, @ANYRES32=0xee01, @ANYRES32=0xee00, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x4044005}, 0x40) write$cgroup_pid(r1, &(0x7f0000000040)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x2, 0x5, 0x0, 0x0, 0x9, 0x81b38e6b89b7f8a3, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3d18, 0x0, @perf_bp={&(0x7f0000000080), 0xb}, 0x100401, 0x1c0000000000000, 0xffffff01, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffe}, r2, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000740)={@cgroup, r0, 0x33, 0x2000, 0x0, @link_fd=r0}, 0x20) 01:28:41 executing program 2: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x9, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x8b}], &(0x7f0000000140)='GPL\x00', 0xff, 0x16, &(0x7f0000000180)=""/22, 0x41000, 0x22, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x8c90, 0xffffffffffffffff, 0x6, &(0x7f0000000200)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x3, 0x1, 0x3, 0x9}, {0x3, 0x3, 0x6, 0x7}, {0x5, 0x3, 0x1, 0x8}, {0x2, 0x5, 0x3, 0x9}, {0x4, 0x4, 0xb, 0x4}, {0x2, 0x4, 0xd, 0x8}], 0x10, 0x1}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r2}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0xffa4) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) r4 = gettid() r5 = gettid() r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000009c0)={0x1, 0xffffffffffffffff}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r9, 0x800454e1, 0x0) ioctl$TUNSETIFINDEX(r9, 0x400454da, &(0x7f0000000b00)) r10 = getpid() sendmsg$unix(r8, &(0x7f0000001700)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001640)=[@cred={{0x1c, 0x1, 0x2, {r10, 0x0, 0xee01}}}], 0x20}, 0x0) sendmsg$unix(r1, &(0x7f0000000ac0)={&(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000440)="0c6c53fe0a7e466609e433830ca78ea32359b0345d1ca17994a8a9b20b8e8679b79d1543867c93b2512b8768bf50eaf9466736388f8afa1dc3a5751f8aaed42a020baee79c1e24c822ff90c89f1bfe14e3ce0c", 0x53}, {&(0x7f00000004c0)="793bd0dd6af5abe03948f951f0a376f21db49a6ad38b199e02", 0x19}, {&(0x7f0000000500)="819b430f591f898eff3e2970bcadd9fa7f42bfcccf09c8", 0x17}, {&(0x7f0000000540)="76ac1f8e5272e545c629204c4a7a2c4dee497a0e222fcd6d0a402e0182016ab75c6719f508becd5b0665468b0ec127dc92ba64aeca4ff4dc4c61630c671781a88dd34464c352ad481bab48a61a001ef3b31921e0bfa13d4005cc035985af45e6bab73c62355eee4e9f1238cf8cb39b5c94478600cc6ebd5d345ec575fc4d4be3499aa9dd6ff727786b0f8654f224f701ceba9605c4a842185485fe7c7000f21be389f4e3", 0xa4}, {&(0x7f0000000600)="86c97d584240b860549414815d4b918d281f8246e0e50629f046bfbe5bc7a7845556edf837bddad630f1421c2fcaad358cf5cccd600b37481465e7004f3ceb4295d9773fc66f7f4f8f3651f026a4c27773f1d422b17db6b7d44394da10734e5a837d49a58cce85de8ccf605ad8d6ecf9fc4635a91c34f615b2dd8169808d2913f8f2f41725d3748d491902ea72efc92dbc0ea44198bfa949cc2d52d191993f114ea17891cad262edcedda360b5749e7265f3", 0xb2}, {&(0x7f00000006c0)="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", 0xfb}, {&(0x7f00000007c0)="8259d36907647bfd32b32759e3398f14a57c75712efe15d26848130ce5e8806f5103b4dfc71ebda7001d6019b5b8795b5ba8f05c73ff5805d5fa8d074031de3cdfbe15efcc825ea1eb71d226551c3412404cd09e633eab0fe7e24718bb96a04707d6b43ab4887f46cdb5436db9499289ba", 0x71}, {&(0x7f0000000840)="f7993a732459952c2e6ca5951357d9061f33a0d73e82c2ef92119f5bf0462512f22c9c6f85aae8cb933618a613b661fbd0cddd97d018b29fd8f7466aaf6a49524b7c23617e95c91b03198945cbd6ec80e21c0141738684a0788ce599d8d0a2628f3fc1c4fd3fecdc6f0b41e2207cb243b251a89365064e1414a7012ad51830de3636f7", 0x83}], 0x8, &(0x7f0000000a00)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r3, r1]}}, @rights={{0x38, 0x1, 0x1, [r0, r3, r6, r2, r2, r1, r1, r7, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0x0, 0xee00}}}], 0xb8, 0x22000000}, 0x0) [ 907.999860][T29801] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 908.097067][T27132] Bluetooth: hci4: command 0x041b tx timeout 01:28:42 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0") [ 910.177117][T27127] Bluetooth: hci4: command 0x040f tx timeout 01:28:44 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x5) r2 = perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x9, 0x1b, 0x81, 0x1f, 0x0, 0x101, 0x844f2, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0xffffffffffffffff, 0xffffffff}, 0x9000, 0x2, 0x3, 0x2, 0x8, 0x10000, 0x7, 0x0, 0x8, 0x0, 0x6b}, 0x0, 0x7, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3ff) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3ff) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) 01:28:45 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000180)={&(0x7f0000000040)=@pppoe={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'bond0\x00'}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="b5eab6c1f35d0b67fe67e3114f561021a5466e22a25fe3edec6c1eb7782d9d110ea8122412707a0998da76d1a527c0e70e1ac05b81dbd556ad9bd01b93326530fd540b77d481c7096b17082ff946587a3d964dcc86edec8b21a65c0de41b95841c8a43c8a2664f42f41265b309b5178c837ca6be13", 0x75}], 0x1}, 0x4000) syz_clone(0x4000000, &(0x7f0000000540)="76626b4afd00b5b443b07511a55f315f9e963b6560a787a078fdff791886a6581d93f19ba4ce0fda6b408550551b44fdfbcc05a4c3ce9b36f9832b767b728523c534e33de0b01a9ea73858594d2a20bf7950f344eb27bcb50073ac165c63f309ded25712097db515e5768fb543ee66cc146cc23f5ce440694e9a4eda70893f466372ef548b5560499b43885240c49d764aaabc047392f38c040f80375707b81ba5412e057538d8fe28", 0xa9, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)="920b04f93c16087b498f303c6bba2fa999f0") [ 912.267072][T27127] Bluetooth: hci4: command 0x0419 tx timeout 01:28:47 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x5, [@enum={0x4, 0x2, 0x0, 0x6, 0x4, [{0x3, 0xffff}, {0xf, 0x7}]}, @enum={0x2, 0x4, 0x0, 0x6, 0x4, [{0x6, 0x7fff}, {0xd, 0x3d458956}, {0xd, 0x20}, {0x3, 0xe9a8839f}]}, @union={0x9, 0xa, 0x0, 0x5, 0x0, 0x49, [{0xe, 0x2, 0x5}, {0x7, 0x4, 0xe4cd}, {0xd, 0x4, 0x4}, {0xc, 0x2, 0x1}, {0x0, 0x4, 0x4}, {0xb, 0x0, 0x1}, {0x0, 0x5, 0xfffff800}, {0xd, 0x5, 0xbfb3}, {0xb, 0x5, 0x101}, {0xe, 0x0, 0xabd9}]}, @restrict={0x9}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x71, 0x0, 0x26, 0x2}]}, {0x0, [0x5f, 0x0, 0x3e]}}, &(0x7f00000001c0)=""/212, 0x105, 0xd4, 0x0, 0xfff}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000380)=""/24, 0x18, 0x0, &(0x7f00000003c0)=""/59, 0x3b}}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xfa28, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x4}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x100, 0x8}, 0xc) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x48) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r8, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0xd, 0xa, 0x7, 0x100, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2e, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000300)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x9, 0x0, 0x9}, 0x10, r1, 0x0, 0x0, &(0x7f0000000700)=[r2, r3, r4, r5, r6, r7, r8], 0x0, 0x10, 0x51f}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) 01:28:48 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0xc, &(0x7f00000006c0), 0x4) [ 915.708306][T30312] bridge0: port 1(bridge_slave_0) entered blocking state [ 915.725875][T30312] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.749034][T30312] device bridge_slave_0 entered promiscuous mode [ 915.779155][T30312] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.798699][T30312] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.808519][T30312] device bridge_slave_1 entered promiscuous mode 01:28:50 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe8, 0xe8, 0x5, [@enum={0x4, 0x2, 0x0, 0x6, 0x4, [{0x3, 0xffff}, {0xf, 0x7}]}, @enum={0x2, 0x4, 0x0, 0x6, 0x4, [{0x6, 0x7fff}, {0xd, 0x3d458956}, {0xd, 0x20}, {0x3, 0xe9a8839f}]}, @union={0x9, 0xa, 0x0, 0x5, 0x0, 0x49, [{0xe, 0x2, 0x5}, {0x7, 0x4, 0xe4cd}, {0xd, 0x4, 0x4}, {0xc, 0x2, 0x1}, {0x0, 0x4, 0x4}, {0xb, 0x0, 0x1}, {0x0, 0x5, 0xfffff800}, {0xd, 0x5, 0xbfb3}, {0xb, 0x5, 0x101}, {0xe, 0x0, 0xabd9}]}, @restrict={0x9}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x71, 0x0, 0x26, 0x2}]}, {0x0, [0x5f, 0x0, 0x3e]}}, &(0x7f00000001c0)=""/212, 0x105, 0xd4, 0x0, 0xfff}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f0000000380)=""/24, 0x18, 0x0, &(0x7f00000003c0)=""/59, 0x3b}}, 0x10) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xfa28, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x4}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1}, 0x48) (async) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x3}, 0x48) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0x0, 0x100, 0x8}, 0xc) (async) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000640)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x5}, 0x48) (async) r8 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r8, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x1, 0xd, 0xa, 0x7, 0x100, 0xfffffffffffffffc}], &(0x7f0000000040)='GPL\x00', 0x8, 0x0, 0x0, 0x40f00, 0x2e, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000300)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x9, 0x0, 0x9}, 0x10, r1, 0x0, 0x0, &(0x7f0000000700)=[r2, r3, r4, r5, r6, r7, r8], 0x0, 0x10, 0x51f}, 0x90) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) [ 916.907133][ T13] Bluetooth: hci6: command 0x0409 tx timeout [ 916.913824][ T13] Bluetooth: hci5: command 0x0409 tx timeout 01:28:51 executing program 1: bpf$BPF_MAP_CONST_STR_FREEZE(0xd, &(0x7f00000006c0), 0x4) 01:28:52 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) [ 918.053611][ T7231] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 01:28:53 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x9, &(0x7f00000000c0)=@raw=[@btf_id={0x18, 0x8, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x7}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x8b}], &(0x7f0000000140)='GPL\x00', 0xff, 0x16, &(0x7f0000000180)=""/22, 0x41000, 0x22, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x8c90, 0xffffffffffffffff, 0x6, &(0x7f0000000200)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000240)=[{0x3, 0x1, 0x3, 0x9}, {0x3, 0x3, 0x6, 0x7}, {0x5, 0x3, 0x1, 0x8}, {0x2, 0x5, 0x3, 0x9}, {0x4, 0x4, 0xb, 0x4}, {0x2, 0x4, 0xd, 0x8}], 0x10, 0x1}, 0x90) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)=@o_path={&(0x7f0000000080)='./file0\x00', r0, 0x4000, r2}, 0x18) (async, rerun: 32) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0xffa4) (rerun: 32) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) (async) r4 = gettid() r5 = gettid() (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000009c0)={0x1, 0xffffffffffffffff}, 0x4) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r9, 0x800454e1, 0x0) (async) ioctl$TUNSETIFINDEX(r9, 0x400454da, &(0x7f0000000b00)) (async) r10 = getpid() sendmsg$unix(r8, &(0x7f0000001700)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000001640)=[@cred={{0x1c, 0x1, 0x2, {r10, 0x0, 0xee01}}}], 0x20}, 0x0) sendmsg$unix(r1, &(0x7f0000000ac0)={&(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000900)=[{&(0x7f0000000440)="0c6c53fe0a7e466609e433830ca78ea32359b0345d1ca17994a8a9b20b8e8679b79d1543867c93b2512b8768bf50eaf9466736388f8afa1dc3a5751f8aaed42a020baee79c1e24c822ff90c89f1bfe14e3ce0c", 0x53}, {&(0x7f00000004c0)="793bd0dd6af5abe03948f951f0a376f21db49a6ad38b199e02", 0x19}, {&(0x7f0000000500)="819b430f591f898eff3e2970bcadd9fa7f42bfcccf09c8", 0x17}, {&(0x7f0000000540)="76ac1f8e5272e545c629204c4a7a2c4dee497a0e222fcd6d0a402e0182016ab75c6719f508becd5b0665468b0ec127dc92ba64aeca4ff4dc4c61630c671781a88dd34464c352ad481bab48a61a001ef3b31921e0bfa13d4005cc035985af45e6bab73c62355eee4e9f1238cf8cb39b5c94478600cc6ebd5d345ec575fc4d4be3499aa9dd6ff727786b0f8654f224f701ceba9605c4a842185485fe7c7000f21be389f4e3", 0xa4}, {&(0x7f0000000600)="86c97d584240b860549414815d4b918d281f8246e0e50629f046bfbe5bc7a7845556edf837bddad630f1421c2fcaad358cf5cccd600b37481465e7004f3ceb4295d9773fc66f7f4f8f3651f026a4c27773f1d422b17db6b7d44394da10734e5a837d49a58cce85de8ccf605ad8d6ecf9fc4635a91c34f615b2dd8169808d2913f8f2f41725d3748d491902ea72efc92dbc0ea44198bfa949cc2d52d191993f114ea17891cad262edcedda360b5749e7265f3", 0xb2}, {&(0x7f00000006c0)="44e010cb585a25e43f77de40415081b3750fc1558d0a14a14b5ab11314d0992f34976c9ea127303e1363e47cd9d356fe6d24f58a5c87ad7f790d0089c99931d07f708b92ed0622a6da7b90d443ad5004f4cecec7096a7fe47e6baa7f51ea397be79a04f2ec238c276fd03847cf9e5a8bba3ce9052d6113cac71aa58fd49c53011bf15ee2d87fe640887ae293a896466108b5e954a2ec60b7ec522ec8126d2990f2f7e70edf204a378edbfa07feebf1e556f2d5428217bedd1b2236f7a1a112c78c5f4d7ea8ce753ea6e3167515c0707afa9eebc19216c963d17ecd8aea0fa9b18fa700a6e81b50a78a706571cc68c3cb26bee8723deaffab8b1881", 0xfb}, {&(0x7f00000007c0)="8259d36907647bfd32b32759e3398f14a57c75712efe15d26848130ce5e8806f5103b4dfc71ebda7001d6019b5b8795b5ba8f05c73ff5805d5fa8d074031de3cdfbe15efcc825ea1eb71d226551c3412404cd09e633eab0fe7e24718bb96a04707d6b43ab4887f46cdb5436db9499289ba", 0x71}, {&(0x7f0000000840)="f7993a732459952c2e6ca5951357d9061f33a0d73e82c2ef92119f5bf0462512f22c9c6f85aae8cb933618a613b661fbd0cddd97d018b29fd8f7466aaf6a49524b7c23617e95c91b03198945cbd6ec80e21c0141738684a0788ce599d8d0a2628f3fc1c4fd3fecdc6f0b41e2207cb243b251a89365064e1414a7012ad51830de3636f7", 0x83}], 0x8, &(0x7f0000000a00)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee00, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r0, r3, r1]}}, @rights={{0x38, 0x1, 0x1, [r0, r3, r6, r2, r2, r1, r1, r7, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r10, 0x0, 0xee00}}}], 0xb8, 0x22000000}, 0x0) [ 918.977166][T24583] Bluetooth: hci5: command 0x041b tx timeout [ 918.984019][T24583] Bluetooth: hci6: command 0x041b tx timeout 01:28:53 executing program 2: bpf$BPF_MAP_CONST_STR_FREEZE(0xe, &(0x7f00000006c0), 0x4) [ 919.191582][T29801] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 01:28:54 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) [ 921.077208][T24583] Bluetooth: hci6: command 0x040f tx timeout [ 921.087579][T24583] Bluetooth: hci5: command 0x040f tx timeout 01:28:55 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) 01:28:56 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) [ 922.345463][ T7231] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 01:28:57 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) [ 923.121284][T29801] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.147078][T27132] Bluetooth: hci5: command 0x0419 tx timeout [ 923.160265][T30312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 923.177547][T27132] Bluetooth: hci6: command 0x0419 tx timeout [ 924.268603][ T7231] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.534649][T30312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:28:58 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) 01:28:59 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) 01:28:59 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) 01:28:59 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) 01:29:00 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) [ 926.673389][ T7231] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 01:29:00 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) [ 926.834973][T30312] team0: Port device team_slave_0 added 01:29:01 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 01:29:01 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) [ 927.322055][T30312] team0: Port device team_slave_1 added 01:29:01 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) 01:29:01 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) [ 928.136272][T30312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 928.147721][T30312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 928.243403][T30312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 928.295461][T30312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 928.305449][T30312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 928.347948][T30312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 01:29:02 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) 01:29:02 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 01:29:03 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) 01:29:03 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) 01:29:04 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) 01:29:04 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) [ 930.404737][T30312] device hsr_slave_0 entered promiscuous mode [ 930.674815][T30312] device hsr_slave_1 entered promiscuous mode 01:29:05 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) [ 930.974126][T30312] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 930.997487][T30312] Cannot create hsr debugfs directory 01:29:05 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000180)={r0}) [ 931.538864][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.545195][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 01:29:05 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x298a5631) 01:29:05 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) 01:29:06 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000180)={r0}) [ 932.518086][T30465] chnl_net:caif_netlink_parms(): no params data found 01:29:06 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x298a5631) 01:29:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={r0}) 01:29:07 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r0}) 01:29:08 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000100)='./file0\x00', r0}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x58, &(0x7f0000000200)}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4018}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000000)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x18) 01:29:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={r0}) 01:29:08 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)) 01:29:08 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000100)='./file0\x00', r0}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x58, &(0x7f0000000200)}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4018}, 0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000000)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x18) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)=@generic={&(0x7f0000000100)='./file0\x00', r0}, 0x18) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0x58, &(0x7f0000000200)}, 0x10) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x4018}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000000)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x18) (async) 01:29:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={r0}) 01:29:09 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) 01:29:09 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)) 01:29:09 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 01:29:10 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) 01:29:10 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)) 01:29:10 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 01:29:10 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r0}) 01:29:11 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x4010, r1}, 0x18) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x10001, 0x0}, 0x8) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2, 0x200, 0x10}, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4, r3}, 0x18) 01:29:11 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r0}) 01:29:11 executing program 1: r0 = socket$kcm(0x29, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 01:29:11 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) (async) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x4010, r1}, 0x18) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x10001, 0x0}, 0x8) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r2, 0x200, 0x10}, 0xc) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4, r3}, 0x18) 01:29:12 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r0}) 01:29:12 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)='--*{:\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) [ 938.699528][T30467] chnl_net:caif_netlink_parms(): no params data found 01:29:13 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 01:29:13 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)='--*{:\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r0}, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) 01:29:13 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r0}) 01:29:13 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 01:29:14 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0xffffffec) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x21, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fff}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2f3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xd, 0x83a, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x1, 0xffffffffffffffff], &(0x7f0000000280)=[{0x4, 0x5, 0x5, 0x5}, {0x3, 0x1, 0xc, 0xc}, {0x2, 0x1, 0x6, 0x5}, {0x1, 0x1, 0x8, 0x1}, {0x1, 0x5, 0xd, 0xc}, {0x2, 0x4, 0x10, 0x3}, {0x5, 0x3, 0x6}], 0x10, 0x6}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8, r0}, 0x18) 01:29:14 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r1}) 01:29:14 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r0}) 01:29:14 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0xffffffec) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x21, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7fff}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2f3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000180)='syzkaller\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0xd, 0x83a, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x1, 0xffffffffffffffff], &(0x7f0000000280)=[{0x4, 0x5, 0x5, 0x5}, {0x3, 0x1, 0xc, 0xc}, {0x2, 0x1, 0x6, 0x5}, {0x1, 0x1, 0x8, 0x1}, {0x1, 0x5, 0xd, 0xc}, {0x2, 0x4, 0x10, 0x3}, {0x5, 0x3, 0x6}], 0x10, 0x6}, 0x90) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8, r0}, 0x18) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8, r0}, 0x18) 01:29:15 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) 01:29:15 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)={r0}) 01:29:15 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000040)="232ef0cb5f633e8156b55daf899286036c18544be82e5256672277eee75f7cb0c3c69c126a30ea7fc869bbaf766d666dc35ab3ee8287e293eebb086c22db79dc9110a14e7618b58beff9eb778d53007573d843cf40a49d780794866fc6beca8b82d062c7b48bdb8eead704ecd33409dbffb074c6143771faab7a414fa70cc5afd3841756413fbe221afadd8b12c0e69e340e4e9770", &(0x7f0000000100)=""/60}, 0x20) 01:29:15 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) 01:29:16 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1, 0xffffffffffffffff}, 0x4) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000040)="232ef0cb5f633e8156b55daf899286036c18544be82e5256672277eee75f7cb0c3c69c126a30ea7fc869bbaf766d666dc35ab3ee8287e293eebb086c22db79dc9110a14e7618b58beff9eb778d53007573d843cf40a49d780794866fc6beca8b82d062c7b48bdb8eead704ecd33409dbffb074c6143771faab7a414fa70cc5afd3841756413fbe221afadd8b12c0e69e340e4e9770", &(0x7f0000000100)=""/60}, 0x20) 01:29:16 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) 01:29:16 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) 01:29:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/155, 0x9b}, {&(0x7f0000000180)=""/193, 0xc1}, {&(0x7f0000000280)=""/103, 0x67}], 0x3, &(0x7f0000000340)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x168}, 0x41) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) 01:29:17 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) 01:29:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/155, 0x9b}, {&(0x7f0000000180)=""/193, 0xc1}, {&(0x7f0000000280)=""/103, 0x67}], 0x3, &(0x7f0000000340)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x168}, 0x41) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) 01:29:17 executing program 2: socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={r0}) 01:29:17 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) 01:29:18 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) [ 944.055384][T30465] bridge0: port 1(bridge_slave_0) entered blocking state [ 944.077154][T30465] bridge0: port 1(bridge_slave_0) entered disabled state 01:29:18 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) [ 944.131571][T30465] device bridge_slave_0 entered promiscuous mode 01:29:18 executing program 1: socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={r0}) 01:29:18 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) 01:29:18 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x18) 01:29:18 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={r0}) 01:29:19 executing program 2: socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)={r0}) 01:29:19 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000a00)={r0, r0, 0x0, r0}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x80, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x44, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x1a, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xd0f}, {}, {}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fff}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000740)='syzkaller\x00', 0xfffffbff, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x3d, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0xf, 0x2, 0x101}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000800)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000840)=[{0x3, 0x2, 0x6, 0x2}], 0x10, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x4, 0x1a, &(0x7f00000000c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff000}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1fc0000}, @jmp={0x5, 0x0, 0x6, 0x1, 0x5, 0x1, 0xfffffffffffffff0}], &(0x7f00000001c0)='GPL\x00', 0x7f, 0xdc, &(0x7f0000000200)=""/220, 0x41100, 0x1, '\x00', r3, 0x13, r4, 0x8, &(0x7f0000000600)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5, 0x0, 0x0, 0x0, 0x10, 0x80000001}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) [ 945.340054][T30465] bridge0: port 2(bridge_slave_1) entered blocking state [ 945.348432][T30465] bridge0: port 2(bridge_slave_1) entered disabled state [ 945.356775][T30465] device bridge_slave_1 entered promiscuous mode 01:29:19 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) 01:29:19 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 01:29:20 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000a00)={r0, r0, 0x0, r0}, 0x10) (async) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000040)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x80, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x44, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x10, 0x1a, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0xd0f}, {}, {}, [@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fff}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @exit], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000740)='syzkaller\x00', 0xfffffbff, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x3d, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0xf, 0x2, 0x101}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000800)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0x1], &(0x7f0000000840)=[{0x3, 0x2, 0x6, 0x2}], 0x10, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x4, 0x1a, &(0x7f00000000c0)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffff000}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1fc0000}, @jmp={0x5, 0x0, 0x6, 0x1, 0x5, 0x1, 0xfffffffffffffff0}], &(0x7f00000001c0)='GPL\x00', 0x7f, 0xdc, &(0x7f0000000200)=""/220, 0x41100, 0x1, '\x00', r3, 0x13, r4, 0x8, &(0x7f0000000600)={0x1, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, r5, 0x0, 0x0, 0x0, 0x10, 0x80000001}, 0x90) (async) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) 01:29:20 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) 01:29:20 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 01:29:21 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) [ 947.251911][T30467] bridge0: port 1(bridge_slave_0) entered blocking state [ 947.259969][T30467] bridge0: port 1(bridge_slave_0) entered disabled state [ 947.288866][T30467] device bridge_slave_0 entered promiscuous mode 01:29:21 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) 01:29:21 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 01:29:22 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 01:29:22 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000180)) 01:29:22 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) [ 948.471000][T30467] bridge0: port 2(bridge_slave_1) entered blocking state [ 948.487128][T30467] bridge0: port 2(bridge_slave_1) entered disabled state [ 948.548463][T30467] device bridge_slave_1 entered promiscuous mode [ 948.611636][T30465] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 01:29:22 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) 01:29:23 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 01:29:23 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 01:29:23 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) [ 949.772304][T30465] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:29:24 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) 01:29:24 executing program 1: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 01:29:24 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)) 01:29:24 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000000)=@generic={0x0, "68fbdbb206740a1c1c068c8a6b50d3731f3667106ef0cf7ca03d7c9f2e8c39fc4d396ff2af39eb31a17394c929bfdf72c63bbf3c687f2735de94d793d17dbbadf5700072bd6e4e9580192dbb120adbe44d24b3b69a048ff79fd0c2c6713ee65dd4166fd53069aa1e52fc406ebd99e05ed03f01684aeeb6b81e59f522bd80"}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="0a5b4e7ac74a8d45f1d86c0cf48a", 0xe}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) [ 950.659727][T30467] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 950.706844][T30467] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 01:29:25 executing program 2: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 01:29:25 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r1}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r2}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000180)={r0}) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@o_path={&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x10, r0}, 0x18) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000006c0), 0x4) [ 951.268453][T30465] team0: Port device team_slave_0 added [ 951.293669][T30467] team0: Port device team_slave_0 added [ 951.330824][T30465] team0: Port device team_slave_1 added [ 951.361568][T30467] team0: Port device team_slave_1 added [ 953.858619][T30467] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 953.865635][T30467] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 953.906162][T30467] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 955.020975][T30465] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 955.039885][T30465] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 955.113389][T30465] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 955.447730][T30467] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 955.467092][T30467] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 955.518812][T30467] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 955.533966][T30465] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 955.567007][T30465] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 955.644427][T30465] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 955.889096][T30467] device hsr_slave_0 entered promiscuous mode [ 955.977756][T30467] device hsr_slave_1 entered promiscuous mode [ 956.007414][T30467] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 956.021426][T30467] Cannot create hsr debugfs directory [ 956.969188][T30465] device hsr_slave_0 entered promiscuous mode [ 956.976342][T30465] device hsr_slave_1 entered promiscuous mode [ 957.287254][T30465] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 957.295100][T30465] Cannot create hsr debugfs directory [ 960.301764][T30312] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 960.619494][T30312] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 961.315283][T30312] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 961.369634][T30312] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 961.524300][T30467] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 961.557289][T30467] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 961.762272][T30467] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 961.893020][T30467] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 962.723625][T30465] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 962.849348][T30312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 962.867263][T30465] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 962.936626][T30312] 8021q: adding VLAN 0 to HW filter on device team0 [ 962.962331][T30465] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 963.070275][T30465] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 963.171164][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 963.180699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 963.910774][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 963.936789][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 963.957693][ T3568] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.964790][ T3568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.001096][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 964.040924][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 964.068156][ T3568] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.075294][ T3568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.202057][T27127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 964.217911][T27127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 964.294420][T30467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 964.346978][T30467] 8021q: adding VLAN 0 to HW filter on device team0 [ 964.354254][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 964.364546][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 964.391354][T30465] 8021q: adding VLAN 0 to HW filter on device bond0 [ 964.707291][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 964.716021][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 964.737661][ T3568] bridge0: port 1(bridge_slave_0) entered blocking state [ 964.744750][ T3568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.777524][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 964.807027][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 964.818322][ T3568] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.825398][ T3568] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.850382][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 964.877098][T30465] 8021q: adding VLAN 0 to HW filter on device team0 [ 965.809407][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 965.818750][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 965.826694][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 965.850725][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 965.884546][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 965.915461][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 965.934981][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 965.968036][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 965.976757][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 966.022066][T24583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 966.094103][T30467] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 966.138047][T30467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 966.147696][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 966.155778][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 966.204381][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 966.225971][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 966.233121][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 966.267634][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 966.276657][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 966.285871][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 966.293114][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 966.327543][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 966.336549][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 966.361048][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 966.727779][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 966.735858][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 966.761150][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 966.786248][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 966.813405][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 966.833180][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 966.855681][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 966.880232][ T3568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 966.913739][T30465] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 966.942805][T30465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 966.984009][T27132] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 966.998097][T27132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 967.006625][T27132] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 967.093204][T30467] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 967.142027][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 967.150432][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 968.128109][ T7231] device hsr_slave_0 left promiscuous mode [ 968.142599][ T7231] device hsr_slave_1 left promiscuous mode [ 968.245977][ T7231] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 968.267287][ T7231] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 968.309237][ T7231] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 968.325867][ T7231] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 968.374746][ T7231] device bridge_slave_1 left promiscuous mode [ 968.397173][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.472108][ T7231] device bridge_slave_0 left promiscuous mode [ 968.497206][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.076371][ T7231] device hsr_slave_0 left promiscuous mode [ 969.254169][ T7231] device hsr_slave_1 left promiscuous mode [ 969.446678][ T7231] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 969.457103][ T7231] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 969.490718][ T7231] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 969.498325][ T7231] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 969.568079][ T7231] device bridge_slave_1 left promiscuous mode [ 969.574477][ T7231] bridge0: port 2(bridge_slave_1) entered disabled state [ 969.777117][ T7231] device bridge_slave_0 left promiscuous mode [ 969.783640][ T7231] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.947256][ T7] Bluetooth: hci1: command 0x0409 tx timeout [ 970.460243][ T7231] device veth1_macvtap left promiscuous mode [ 970.474534][ T7231] device veth0_macvtap left promiscuous mode [ 970.480771][ T7231] device veth1_vlan left promiscuous mode [ 970.486595][ T7231] device veth0_vlan left promiscuous mode [ 971.618209][ T7231] device veth1_macvtap left promiscuous mode [ 971.624289][ T7231] device veth0_macvtap left promiscuous mode [ 971.647159][ T7231] device veth1_vlan left promiscuous mode [ 971.653007][ T7231] device veth0_vlan left promiscuous mode [ 972.027178][ T7] Bluetooth: hci1: command 0x041b tx timeout [ 974.097079][ T3568] Bluetooth: hci1: command 0x040f tx timeout [ 976.187105][ T13] Bluetooth: hci1: command 0x0419 tx timeout 01:29:50 executing program 1: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000000)=@generic={0x0, "68fbdbb206740a1c1c068c8a6b50d3731f3667106ef0cf7ca03d7c9f2e8c39fc4d396ff2af39eb31a17394c929bfdf72c63bbf3c687f2735de94d793d17dbbadf5700072bd6e4e9580192dbb120adbe44d24b3b69a048ff79fd0c2c6713ee65dd4166fd53069aa1e52fc406ebd99e05ed03f01684aeeb6b81e59f522bd80"}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="0a5b4e7ac74a8d45f1d86c0cf48a", 0xe}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) [ 979.867261][ T3568] Bluetooth: hci2: command 0x0409 tx timeout 01:29:55 executing program 2: bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000000)=@generic={0x0, "68fbdbb206740a1c1c068c8a6b50d3731f3667106ef0cf7ca03d7c9f2e8c39fc4d396ff2af39eb31a17394c929bfdf72c63bbf3c687f2735de94d793d17dbbadf5700072bd6e4e9580192dbb120adbe44d24b3b69a048ff79fd0c2c6713ee65dd4166fd53069aa1e52fc406ebd99e05ed03f01684aeeb6b81e59f522bd80"}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="0a5b4e7ac74a8d45f1d86c0cf48a", 0xe}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) (async) socket$kcm(0x29, 0x5, 0x0) (async) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000000)=@generic={0x0, "68fbdbb206740a1c1c068c8a6b50d3731f3667106ef0cf7ca03d7c9f2e8c39fc4d396ff2af39eb31a17394c929bfdf72c63bbf3c687f2735de94d793d17dbbadf5700072bd6e4e9580192dbb120adbe44d24b3b69a048ff79fd0c2c6713ee65dd4166fd53069aa1e52fc406ebd99e05ed03f01684aeeb6b81e59f522bd80"}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)="0a5b4e7ac74a8d45f1d86c0cf48a", 0xe}], 0x1}, 0x0) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) (async) [ 981.947142][ T3568] Bluetooth: hci2: command 0x041b tx timeout [ 982.741522][T27132] Bluetooth: hci3: command 0x0409 tx timeout [ 982.897137][T27132] Bluetooth: hci4: command 0x0409 tx timeout [ 984.019212][ T3568] Bluetooth: hci2: command 0x040f tx timeout [ 984.737087][ T3568] Bluetooth: hci7: command 0x0409 tx timeout [ 984.818900][ T3568] Bluetooth: hci3: command 0x041b tx timeout [ 984.977020][ T3568] Bluetooth: hci4: command 0x041b tx timeout [ 986.107155][ T3568] Bluetooth: hci2: command 0x0419 tx timeout [ 986.817122][ T3568] Bluetooth: hci7: command 0x041b tx timeout [ 986.907140][ T3568] Bluetooth: hci3: command 0x040f tx timeout [ 987.057057][ T3568] Bluetooth: hci4: command 0x040f tx timeout [ 988.907269][ T3568] Bluetooth: hci7: command 0x040f tx timeout [ 988.987303][ T3568] Bluetooth: hci3: command 0x0419 tx timeout [ 989.147335][ T3568] Bluetooth: hci4: command 0x0419 tx timeout [ 990.977024][ T7] Bluetooth: hci7: command 0x0419 tx timeout [ 991.675619][ T7231] team0 (unregistering): Port device team_slave_1 removed [ 992.110477][ T7231] team0 (unregistering): Port device team_slave_0 removed [ 992.587482][ T7231] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 992.978722][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.985050][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 993.183598][ T7231] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 996.563689][ T7231] bond0 (unregistering): Released all slaves [ 1001.298142][ T7231] team0 (unregistering): Port device team_slave_1 removed [ 1001.728306][ T7231] team0 (unregistering): Port device team_slave_0 removed [ 1001.985015][ T7231] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1002.572568][ T7231] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1005.293513][ T7231] bond0 (unregistering): Released all slaves [ 1006.824468][T31057] chnl_net:caif_netlink_parms(): no params data found [ 1007.186103][T31052] chnl_net:caif_netlink_parms(): no params data found [ 1009.223288][T31063] chnl_net:caif_netlink_parms(): no params data found [ 1010.480289][T31035] chnl_net:caif_netlink_parms(): no params data found [ 1012.184031][T31057] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.197042][T31057] bridge0: port 1(bridge_slave_0) entered disabled state [ 1012.267104][T31057] device bridge_slave_0 entered promiscuous mode [ 1012.340294][T31060] chnl_net:caif_netlink_parms(): no params data found [ 1012.367295][T31057] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.374446][T31057] bridge0: port 2(bridge_slave_1) entered disabled state [ 1012.420823][T31057] device bridge_slave_1 entered promiscuous mode [ 1014.770703][T31057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1014.957953][T31063] bridge0: port 1(bridge_slave_0) entered blocking state [ 1014.965170][T31063] bridge0: port 1(bridge_slave_0) entered disabled state [ 1014.994573][T31063] device bridge_slave_0 entered promiscuous mode [ 1015.019883][T31063] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.044175][T31063] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.068650][T31063] device bridge_slave_1 entered promiscuous mode [ 1015.109393][T31052] bridge0: port 1(bridge_slave_0) entered blocking state [ 1015.116793][T31052] bridge0: port 1(bridge_slave_0) entered disabled state [ 1015.149477][T31052] device bridge_slave_0 entered promiscuous mode [ 1015.535528][T31057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1015.660240][T31052] bridge0: port 2(bridge_slave_1) entered blocking state [ 1015.677067][T31052] bridge0: port 2(bridge_slave_1) entered disabled state [ 1015.726830][T31052] device bridge_slave_1 entered promiscuous mode [ 1017.321338][T31057] team0: Port device team_slave_0 added [ 1017.336450][T31063] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1017.373128][T31035] bridge0: port 1(bridge_slave_0) entered blocking state [ 1017.387280][T31035] bridge0: port 1(bridge_slave_0) entered disabled state [ 1017.468824][T31035] device bridge_slave_0 entered promiscuous mode [ 1019.155666][T31057] team0: Port device team_slave_1 added [ 1019.179394][T31063] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1019.199894][T31035] bridge0: port 2(bridge_slave_1) entered blocking state [ 1019.207363][T31035] bridge0: port 2(bridge_slave_1) entered disabled state [ 1019.216018][T31035] device bridge_slave_1 entered promiscuous mode [ 1019.257950][T31060] bridge0: port 1(bridge_slave_0) entered blocking state [ 1019.265049][T31060] bridge0: port 1(bridge_slave_0) entered disabled state [ 1019.298146][T31060] device bridge_slave_0 entered promiscuous mode [ 1019.329883][T31052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1021.231856][T31060] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.257430][T31060] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.266068][T31060] device bridge_slave_1 entered promiscuous mode [ 1021.299696][T31052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1021.668140][T31057] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1021.675145][T31057] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1021.745475][T31057] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1021.772356][T31063] team0: Port device team_slave_0 added [ 1023.561840][T31052] team0: Port device team_slave_0 added [ 1023.574680][T31057] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1023.611518][T31057] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1023.686956][T31057] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1023.729128][T31063] team0: Port device team_slave_1 added [ 1023.737588][T31035] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1023.749466][T31060] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1023.779788][T31060] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1023.818268][T31052] team0: Port device team_slave_1 added [ 1023.829705][T31035] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1027.667691][T31063] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1027.674682][T31063] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1027.750430][T31063] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1028.382547][T31057] device hsr_slave_0 entered promiscuous mode [ 1028.737742][T31057] device hsr_slave_1 entered promiscuous mode [ 1029.051159][T31060] team0: Port device team_slave_0 added [ 1029.077951][T31052] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1029.084948][T31052] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1029.152237][T31052] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1029.193030][T31063] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1029.201454][T31063] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1029.266965][T31063] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1030.722073][T31060] team0: Port device team_slave_1 added [ 1030.732641][T31052] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1030.747114][T31052] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1030.819368][T31052] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1032.508436][T31060] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1032.515427][T31060] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1032.561629][T31060] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1032.990475][T31063] device hsr_slave_0 entered promiscuous mode [ 1033.135508][T31063] device hsr_slave_1 entered promiscuous mode [ 1033.254514][T31063] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1033.274609][T31063] Cannot create hsr debugfs directory [ 1033.616079][T31060] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1033.639407][T31060] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1033.702632][T31060] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1034.347417][ T7] Bluetooth: hci1: command 0x0409 tx timeout [ 1035.577152][T31052] device hsr_slave_0 entered promiscuous mode [ 1035.837514][T31052] device hsr_slave_1 entered promiscuous mode [ 1036.036190][T31052] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1036.050578][T31052] Cannot create hsr debugfs directory [ 1036.417192][ T7] Bluetooth: hci1: command 0x041b tx timeout [ 1037.362828][T31060] device hsr_slave_0 entered promiscuous mode [ 1037.555043][T31060] device hsr_slave_1 entered promiscuous mode [ 1037.630454][T31060] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1037.640127][T31060] Cannot create hsr debugfs directory [ 1038.507252][ T13] Bluetooth: hci1: command 0x040f tx timeout [ 1040.577103][ T3585] Bluetooth: hci1: command 0x0419 tx timeout [ 1042.648453][T31245] chnl_net:caif_netlink_parms(): no params data found [ 1045.938050][ T21] Bluetooth: hci2: command 0x0409 tx timeout [ 1048.027110][ T7] Bluetooth: hci2: command 0x041b tx timeout [ 1048.613937][T31245] bridge0: port 1(bridge_slave_0) entered blocking state [ 1048.627035][T31245] bridge0: port 1(bridge_slave_0) entered disabled state [ 1048.635426][T31245] device bridge_slave_0 entered promiscuous mode [ 1048.897108][ T21] Bluetooth: hci4: command 0x0409 tx timeout [ 1049.067027][ T13] Bluetooth: hci5: command 0x0409 tx timeout [ 1049.599863][T31245] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.607128][T31245] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.621180][T31245] device bridge_slave_1 entered promiscuous mode [ 1050.097090][ T3564] Bluetooth: hci2: command 0x040f tx timeout [ 1050.817190][ T21] Bluetooth: hci6: command 0x0409 tx timeout [ 1050.977120][ T21] Bluetooth: hci4: command 0x041b tx timeout [ 1051.137076][ T21] Bluetooth: hci5: command 0x041b tx timeout [ 1052.177166][ T1069] Bluetooth: hci2: command 0x0419 tx timeout [ 1052.897195][ T21] Bluetooth: hci6: command 0x041b tx timeout [ 1053.057182][ T21] Bluetooth: hci4: command 0x040f tx timeout [ 1053.217022][ T21] Bluetooth: hci5: command 0x040f tx timeout [ 1053.457775][T31245] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1054.237600][T31245] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1054.419083][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.425419][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 [ 1054.977094][T18818] Bluetooth: hci6: command 0x040f tx timeout [ 1055.137209][T18818] Bluetooth: hci4: command 0x0419 tx timeout [ 1055.297003][T18818] Bluetooth: hci5: command 0x0419 tx timeout [ 1055.723283][T31245] team0: Port device team_slave_0 added [ 1055.955693][T31245] team0: Port device team_slave_1 added [ 1057.056983][ T3567] Bluetooth: hci6: command 0x0419 tx timeout [ 1057.538088][T31245] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1057.545166][T31245] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.612912][T31245] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1057.798760][T31245] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1057.805750][T31245] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1057.905985][T31245] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1058.820973][T31262] chnl_net:caif_netlink_parms(): no params data found [ 1059.256180][T31257] chnl_net:caif_netlink_parms(): no params data found [ 1059.273007][T31264] chnl_net:caif_netlink_parms(): no params data found [ 1059.292937][T31267] chnl_net:caif_netlink_parms(): no params data found [ 1059.660357][T31245] device hsr_slave_0 entered promiscuous mode [ 1059.837588][T31245] device hsr_slave_1 entered promiscuous mode [ 1060.017317][T31245] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1060.024918][T31245] Cannot create hsr debugfs directory [ 1064.545991][T31262] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.557044][T31262] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.578378][T31262] device bridge_slave_0 entered promiscuous mode [ 1064.597705][T31264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.604811][T31264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.618218][T31264] device bridge_slave_0 entered promiscuous mode [ 1064.637735][T31257] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.646115][T31257] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.668231][T31257] device bridge_slave_0 entered promiscuous mode [ 1064.681846][T31267] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.691860][T31267] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.717268][T31267] device bridge_slave_0 entered promiscuous mode [ 1065.452612][T31262] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.467042][T31262] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.487155][T31262] device bridge_slave_1 entered promiscuous mode [ 1065.517855][T31264] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.524963][T31264] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.547167][T31264] device bridge_slave_1 entered promiscuous mode [ 1065.555058][T31257] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.568843][T31257] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.607512][T31257] device bridge_slave_1 entered promiscuous mode [ 1065.619199][T31267] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.627565][T31267] bridge0: port 2(bridge_slave_1) entered disabled state [ 1065.647186][T31267] device bridge_slave_1 entered promiscuous mode [ 1068.046094][T31267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1068.090504][T31262] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1068.109551][T31264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1068.446480][T31257] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1069.387260][T31267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1069.399355][T31262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1069.749761][T31264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1069.782775][T31257] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1071.801708][T31262] team0: Port device team_slave_0 added [ 1072.474559][T31257] team0: Port device team_slave_0 added [ 1072.662123][T31267] team0: Port device team_slave_0 added [ 1072.681656][T31262] team0: Port device team_slave_1 added [ 1072.698696][T31264] team0: Port device team_slave_0 added [ 1072.706480][T31257] team0: Port device team_slave_1 added [ 1072.714885][T31267] team0: Port device team_slave_1 added [ 1073.599584][T31264] team0: Port device team_slave_1 added [ 1074.099165][T31262] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1074.106147][T31262] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1074.187323][T31262] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1074.215363][T31257] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1074.227590][T31257] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1074.326932][T31257] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1074.876966][T31267] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1074.883952][T31267] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1074.958501][T31267] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1074.998453][T31262] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1075.005520][T31262] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1075.068218][T31262] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1075.088423][T31257] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1075.095403][T31257] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1075.152949][T31257] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1075.169880][T31264] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1075.176861][T31264] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1075.227085][T31264] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1075.239581][T31267] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1075.246671][T31267] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1075.309568][T31267] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1075.340480][T31264] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1075.352773][T31264] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1075.416968][T31264] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1076.593285][T31257] device hsr_slave_0 entered promiscuous mode [ 1076.760271][T31257] device hsr_slave_1 entered promiscuous mode [ 1076.863055][T31257] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1076.907312][T31257] Cannot create hsr debugfs directory [ 1077.200444][T31262] device hsr_slave_0 entered promiscuous mode [ 1077.318505][T31262] device hsr_slave_1 entered promiscuous mode [ 1077.435721][T31262] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1077.446942][T31262] Cannot create hsr debugfs directory [ 1078.581681][T31264] device hsr_slave_0 entered promiscuous mode [ 1078.728778][T31264] device hsr_slave_1 entered promiscuous mode [ 1078.847035][T31264] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1078.854646][T31264] Cannot create hsr debugfs directory [ 1079.011559][T31267] device hsr_slave_0 entered promiscuous mode [ 1079.228931][T31267] device hsr_slave_1 entered promiscuous mode [ 1079.348247][T31267] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1079.355852][T31267] Cannot create hsr debugfs directory [ 1081.413816][ T7231] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1084.254527][ T7231] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1085.467708][ T7231] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1086.597760][ T7231] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1095.377326][ T26] INFO: task syz-executor.2:28061 blocked for more than 143 seconds. [ 1095.385736][ T26] Not tainted 5.15.152-syzkaller #0 [ 1095.403813][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1095.412605][ T26] task:syz-executor.2 state:D stack:22552 pid:28061 ppid: 25755 flags:0x00004006 [ 1095.466920][ T26] Call Trace: [ 1095.470250][ T26] [ 1095.473196][ T26] __schedule+0x12c4/0x45b0 [ 1095.497021][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1095.503140][ T26] ? print_irqtrace_events+0x210/0x210 [ 1095.527040][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1095.532303][ T26] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1095.557670][ T26] ? __sched_text_start+0x8/0x8 [ 1095.562590][ T26] ? __might_sleep+0xc0/0xc0 [ 1095.587009][ T26] ? prepare_to_wait_event+0x3aa/0x3e0 [ 1095.592599][ T26] schedule+0x11b/0x1f0 [ 1095.596820][ T26] wb_wait_for_completion+0x164/0x290 [ 1095.622620][ T26] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 1095.645257][ T26] ? init_wait_entry+0xd0/0xd0 [ 1095.650512][ T26] __writeback_inodes_sb_nr+0x2ce/0x370 [ 1095.656101][ T26] ? writeback_inodes_sb_nr+0x30/0x30 [ 1095.679391][ T26] ? down_read_trylock+0x24a/0x3b0 [ 1095.684564][ T26] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 1095.713270][ T26] ? ktime_get_coarse_real_ts64+0x36/0x120 [ 1095.724374][ T26] ? cpumask_next+0xc3/0xf0 [ 1095.746968][ T26] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 1095.752378][ T26] try_to_writeback_inodes_sb+0x94/0xb0 [ 1095.785206][ T26] ext4_da_write_begin+0x228/0xb60 [ 1095.796943][ T26] ? ext4_set_page_dirty+0x340/0x340 [ 1095.802284][ T26] ? current_time+0x1af/0x2f0 [ 1095.826951][ T26] ? atime_needs_update+0x7b0/0x7b0 [ 1095.832212][ T26] generic_perform_write+0x2bf/0x5b0 [ 1095.846409][ T26] ? grab_cache_page_write_begin+0x90/0x90 [ 1095.852649][ T26] ? ext4_write_checks+0x255/0x2c0 [ 1095.869469][ T26] ext4_buffered_write_iter+0x227/0x360 [ 1095.875080][ T26] ext4_file_write_iter+0x87c/0x1990 [ 1095.897554][ T26] ? _raw_spin_unlock+0x24/0x40 [ 1095.902459][ T26] ? follow_page_pte+0xad5/0xb60 [ 1095.916986][ T26] ? follow_page_mask+0xb59/0x13f0 [ 1095.922168][ T26] ? ext4_file_read_iter+0x6c0/0x6c0 [ 1095.936930][ T26] ? follow_page+0x130/0x130 [ 1095.941583][ T26] ? find_vma+0xd3/0x230 [ 1095.945846][ T26] ? check_vma_flags+0x407/0x490 [ 1095.966966][ T26] ? iov_iter_kvec+0x4a/0x170 [ 1095.971802][ T26] __kernel_write+0x5b1/0xa60 [ 1095.976552][ T26] ? vfs_read+0xe10/0xe10 [ 1096.006938][ T26] ? __lock_acquire+0x1ff0/0x1ff0 [ 1096.012318][ T26] ? down_read_killable+0x1d2/0x350 [ 1096.026932][ T26] __dump_emit+0x264/0x3a0 [ 1096.031497][ T26] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 1096.050251][ T26] ? dump_emit+0x152/0x3f0 [ 1096.054742][ T26] dump_user_range+0x91/0x320 [ 1096.066967][ T26] elf_core_dump+0x3c7d/0x4570 [ 1096.071778][ T26] ? reacquire_held_locks+0x660/0x660 [ 1096.104497][ T26] ? load_elf_library+0xa40/0xa40 [ 1096.110625][ T26] ? mark_lock+0x98/0x340 [ 1096.114997][ T26] ? __lock_acquire+0x1295/0x1ff0 [ 1096.136993][ T26] ? rcu_read_lock_any_held+0xb3/0x160 [ 1096.142615][ T26] ? kmem_cache_alloc+0x128/0x280 [ 1096.165903][ T26] do_coredump+0x1852/0x31e0 [ 1096.170903][ T26] ? ____kasan_slab_free+0xd8/0x120 [ 1096.176146][ T26] ? slab_free_freelist_hook+0xdd/0x160 [ 1096.207052][ T26] ? nfs_ssc_unregister+0x30/0x30 [ 1096.212165][ T26] ? get_signal+0x8ac/0x14e0 [ 1096.226991][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1096.232449][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1096.246939][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1096.252280][ T26] get_signal+0xc06/0x14e0 [ 1096.256737][ T26] arch_do_signal_or_restart+0xc3/0x1890 [ 1096.276988][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1096.282249][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1096.308036][ T26] ? _raw_spin_unlock+0x40/0x40 [ 1096.312952][ T26] ? get_sigframe_size+0x10/0x10 [ 1096.337184][ T26] ? force_sig_info_to_task+0x34a/0x470 [ 1096.342873][ T26] ? force_sig+0x114/0x1d0 [ 1096.363699][ T26] ? exit_to_user_mode_loop+0x39/0x130 [ 1096.369575][ T26] exit_to_user_mode_loop+0x97/0x130 [ 1096.374898][ T26] exit_to_user_mode_prepare+0xb1/0x140 [ 1096.405418][ T26] irqentry_exit_to_user_mode+0x5/0x40 [ 1096.411359][ T26] exc_general_protection+0x358/0x4f0 [ 1096.416770][ T26] ? vtime_user_enter+0x1eb/0x2d0 [ 1096.444841][ T26] ? __context_tracking_enter+0x5f/0x90 [ 1096.450854][ T26] asm_exc_general_protection+0x22/0x30 [ 1096.456444][ T26] RIP: 0033:0x7fa75c1c3db1 [ 1096.480052][ T26] RSP: 002b:00000000200004f0 EFLAGS: 00010217 [ 1096.500267][ T26] RAX: 0000000000000000 RBX: 00007fa75c2f1f80 RCX: 00007fa75c1c3da9 [ 1096.516965][ T26] RDX: 0000000020000500 RSI: 00000000200004f0 RDI: 0000000000280400 [ 1096.538203][ T26] RBP: 00007fa75c21047a R08: 0000000020000600 R09: 0000000020000600 [ 1096.546234][ T26] R10: 0000000020000540 R11: 0000000000000206 R12: 0000000000000000 [ 1096.581598][ T26] R13: 000000000000000b R14: 00007fa75c2f1f80 R15: 00007fff4ce60618 [ 1096.603687][ T26] [ 1096.606799][ T26] INFO: task syz-executor.2:28312 blocked for more than 144 seconds. [ 1096.630887][ T26] Not tainted 5.15.152-syzkaller #0 [ 1096.636652][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1096.666931][ T26] task:syz-executor.2 state:D stack:22616 pid:28312 ppid: 25755 flags:0x00004006 [ 1096.676194][ T26] Call Trace: [ 1096.706942][ T26] [ 1096.709937][ T26] __schedule+0x12c4/0x45b0 [ 1096.714472][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1096.746922][ T26] ? print_irqtrace_events+0x210/0x210 [ 1096.752446][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1096.776984][ T26] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1096.782953][ T26] ? __sched_text_start+0x8/0x8 [ 1096.796922][ T26] ? __might_sleep+0xc0/0xc0 [ 1096.801571][ T26] ? prepare_to_wait_event+0x3aa/0x3e0 [ 1096.835310][ T26] schedule+0x11b/0x1f0 [ 1096.846960][ T26] wb_wait_for_completion+0x164/0x290 [ 1096.852387][ T26] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 1096.876972][ T26] ? init_wait_entry+0xd0/0xd0 [ 1096.881818][ T26] __writeback_inodes_sb_nr+0x2ce/0x370 [ 1096.907689][ T26] ? writeback_inodes_sb_nr+0x30/0x30 [ 1096.913121][ T26] ? down_read_trylock+0x24a/0x3b0 [ 1096.926919][ T26] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 1096.932972][ T26] ? cpumask_next+0xc3/0xf0 [ 1096.953965][ T26] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 1096.959820][ T26] try_to_writeback_inodes_sb+0x94/0xb0 [ 1096.965404][ T26] ext4_da_write_begin+0x228/0xb60 [ 1096.987037][ T26] ? jbd2_journal_start_reserved+0x300/0x300 [ 1096.993187][ T26] ? ext4_set_page_dirty+0x340/0x340 [ 1097.004758][ T26] ? rcu_is_watching+0x11/0xa0 [ 1097.012019][ T26] ? __mark_inode_dirty+0x3dd/0xd60 [ 1097.029902][ T26] generic_perform_write+0x2bf/0x5b0 [ 1097.050613][ T26] ? __mnt_drop_write_file+0xbe/0xf0 [ 1097.076931][ T26] ? grab_cache_page_write_begin+0x90/0x90 [ 1097.082811][ T26] ? ext4_write_checks+0x255/0x2c0 [ 1097.126941][ T26] ext4_buffered_write_iter+0x227/0x360 [ 1097.132567][ T26] ext4_file_write_iter+0x87c/0x1990 [ 1097.166910][ T26] ? _raw_spin_unlock+0x24/0x40 [ 1097.171996][ T26] ? follow_page_pte+0xad5/0xb60 [ 1097.197111][ T26] ? follow_page_mask+0xb59/0x13f0 [ 1097.202297][ T26] ? ext4_file_read_iter+0x6c0/0x6c0 [ 1097.216920][ T26] ? follow_page+0x130/0x130 [ 1097.221592][ T26] ? find_vma+0xd3/0x230 [ 1097.225856][ T26] ? check_vma_flags+0x407/0x490 [ 1097.231373][ T26] ? iov_iter_kvec+0x4a/0x170 [ 1097.236079][ T26] __kernel_write+0x5b1/0xa60 [ 1097.241848][ T26] ? vfs_read+0xe10/0xe10 [ 1097.246210][ T26] ? __lock_acquire+0x1ff0/0x1ff0 [ 1097.252345][ T26] ? down_read_killable+0x1d2/0x350 [ 1097.266920][ T26] __dump_emit+0x264/0x3a0 [ 1097.271439][ T26] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 1097.277437][ T26] ? dump_emit+0x152/0x3f0 [ 1097.281892][ T26] dump_user_range+0x91/0x320 [ 1097.286597][ T26] elf_core_dump+0x3c7d/0x4570 [ 1097.291965][ T26] ? reacquire_held_locks+0x660/0x660 [ 1097.297896][ T26] ? load_elf_library+0xa40/0xa40 [ 1097.302952][ T26] ? mark_lock+0x98/0x340 [ 1097.308585][ T26] ? __lock_acquire+0x1295/0x1ff0 [ 1097.317259][ T26] ? rcu_read_lock_any_held+0xb3/0x160 [ 1097.323064][ T26] ? kmem_cache_alloc+0x128/0x280 [ 1097.336936][ T26] do_coredump+0x1852/0x31e0 [ 1097.347273][ T26] ? ____kasan_slab_free+0xd8/0x120 [ 1097.352518][ T26] ? slab_free_freelist_hook+0xdd/0x160 [ 1097.377127][ T26] ? nfs_ssc_unregister+0x30/0x30 [ 1097.382279][ T26] ? get_signal+0x8ac/0x14e0 [ 1097.387414][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1097.392645][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1097.416929][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1097.422205][ T26] get_signal+0xc06/0x14e0 [ 1097.426662][ T26] arch_do_signal_or_restart+0xc3/0x1890 [ 1097.436926][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1097.467802][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1097.473782][ T26] ? _raw_spin_unlock+0x40/0x40 [ 1097.497021][ T26] ? get_sigframe_size+0x10/0x10 [ 1097.502036][ T26] ? force_sig_info_to_task+0x34a/0x470 [ 1097.537090][ T26] ? force_sig+0x114/0x1d0 [ 1097.541582][ T26] ? exit_to_user_mode_loop+0x39/0x130 [ 1097.567159][ T26] exit_to_user_mode_loop+0x97/0x130 [ 1097.572513][ T26] exit_to_user_mode_prepare+0xb1/0x140 [ 1097.596976][ T26] irqentry_exit_to_user_mode+0x5/0x40 [ 1097.602499][ T26] exc_general_protection+0x358/0x4f0 [ 1097.627230][ T26] ? vtime_user_enter+0x1eb/0x2d0 [ 1097.632330][ T26] ? __context_tracking_enter+0x5f/0x90 [ 1097.650270][ T26] asm_exc_general_protection+0x22/0x30 [ 1097.655881][ T26] RIP: 0033:0x7fa75c1c3db1 [ 1097.687624][ T26] RSP: 002b:00000000200004f0 EFLAGS: 00010217 [ 1097.693758][ T26] RAX: 0000000000000000 RBX: 00007fa75c2f1f80 RCX: 00007fa75c1c3da9 [ 1097.716919][ T26] RDX: 0000000020000500 RSI: 00000000200004f0 RDI: 0000000000280400 [ 1097.725455][ T26] RBP: 00007fa75c21047a R08: 0000000020000600 R09: 0000000020000600 [ 1097.748880][ T26] R10: 0000000020000540 R11: 0000000000000206 R12: 0000000000000000 [ 1097.781904][ T26] R13: 000000000000000b R14: 00007fa75c2f1f80 R15: 00007fff4ce60618 [ 1097.797541][ T26] [ 1097.800641][ T26] INFO: task syz-executor.2:28375 blocked for more than 145 seconds. [ 1097.836937][ T26] Not tainted 5.15.152-syzkaller #0 [ 1097.842707][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1097.875246][ T26] task:syz-executor.2 state:D stack:22744 pid:28375 ppid: 25755 flags:0x00004006 [ 1097.885299][ T26] Call Trace: [ 1097.896962][ T26] [ 1097.899950][ T26] __schedule+0x12c4/0x45b0 [ 1097.904878][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1097.926939][ T26] ? print_irqtrace_events+0x210/0x210 [ 1097.932462][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1097.946918][ T26] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1097.953076][ T26] ? __sched_text_start+0x8/0x8 [ 1097.968014][ T26] ? __might_sleep+0xc0/0xc0 [ 1097.974090][ T26] ? prepare_to_wait_event+0x3aa/0x3e0 [ 1097.989239][ T26] schedule+0x11b/0x1f0 [ 1097.993450][ T26] wb_wait_for_completion+0x164/0x290 [ 1098.017801][ T26] ? __bpf_trace_writeback_inode_template+0x20/0x20 [ 1098.024468][ T26] ? init_wait_entry+0xd0/0xd0 [ 1098.046999][ T26] __writeback_inodes_sb_nr+0x2ce/0x370 [ 1098.052638][ T26] ? writeback_inodes_sb_nr+0x30/0x30 [ 1098.064758][ T26] ? down_read_trylock+0x24a/0x3b0 [ 1098.077002][ T26] ? try_to_writeback_inodes_sb+0x1d/0xb0 [ 1098.082787][ T26] ? cpumask_next+0xc3/0xf0 [ 1098.113458][ T26] ? get_nr_dirty_inodes+0x25f/0x2e0 [ 1098.126912][ T26] try_to_writeback_inodes_sb+0x94/0xb0 [ 1098.132518][ T26] ext4_da_write_begin+0x228/0xb60 [ 1098.146962][ T26] ? jbd2_journal_start_reserved+0x300/0x300 [ 1098.158599][ T26] ? ext4_set_page_dirty+0x340/0x340 [ 1098.163923][ T26] ? rcu_is_watching+0x11/0xa0 [ 1098.207045][ T26] ? __mark_inode_dirty+0x3dd/0xd60 [ 1098.212311][ T26] generic_perform_write+0x2bf/0x5b0 [ 1098.226922][ T26] ? __mnt_drop_write_file+0xbe/0xf0 [ 1098.232282][ T26] ? grab_cache_page_write_begin+0x90/0x90 [ 1098.246911][ T26] ? ext4_write_checks+0x255/0x2c0 [ 1098.258051][ T26] ext4_buffered_write_iter+0x227/0x360 [ 1098.267184][ T26] ext4_file_write_iter+0x87c/0x1990 [ 1098.286926][ T26] ? _raw_spin_unlock+0x24/0x40 [ 1098.291845][ T26] ? follow_page_pte+0xad5/0xb60 [ 1098.299541][ T26] ? follow_page_mask+0xb59/0x13f0 [ 1098.317067][ T26] ? ext4_file_read_iter+0x6c0/0x6c0 [ 1098.322423][ T26] ? follow_page+0x130/0x130 [ 1098.353095][ T26] ? find_vma+0xd3/0x230 [ 1098.357926][ T26] ? check_vma_flags+0x407/0x490 [ 1098.377660][ T26] ? iov_iter_kvec+0x4a/0x170 [ 1098.382420][ T26] __kernel_write+0x5b1/0xa60 [ 1098.400492][ T26] ? vfs_read+0xe10/0xe10 [ 1098.405185][ T26] ? __lock_acquire+0x1ff0/0x1ff0 [ 1098.429434][ T26] ? down_read_killable+0x1d2/0x350 [ 1098.434714][ T26] __dump_emit+0x264/0x3a0 [ 1098.457194][ T26] ? wait_for_dump_helpers+0x3d0/0x3d0 [ 1098.462721][ T26] ? dump_emit+0x152/0x3f0 [ 1098.487589][ T26] dump_user_range+0x91/0x320 [ 1098.492349][ T26] elf_core_dump+0x3c7d/0x4570 [ 1098.517631][ T26] ? reacquire_held_locks+0x660/0x660 [ 1098.528618][ T26] ? load_elf_library+0xa40/0xa40 [ 1098.538409][ T26] ? mark_lock+0x98/0x340 [ 1098.556927][ T26] ? __lock_acquire+0x1295/0x1ff0 [ 1098.562059][ T26] ? rcu_read_lock_any_held+0xb3/0x160 [ 1098.587455][ T26] ? kmem_cache_alloc+0x128/0x280 [ 1098.592557][ T26] do_coredump+0x1852/0x31e0 [ 1098.606914][ T26] ? ____kasan_slab_free+0xd8/0x120 [ 1098.612176][ T26] ? slab_free_freelist_hook+0xdd/0x160 [ 1098.624837][ T26] ? nfs_ssc_unregister+0x30/0x30 [ 1098.641902][ T26] ? get_signal+0x8ac/0x14e0 [ 1098.646561][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1098.657062][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1098.662434][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1098.676916][ T26] get_signal+0xc06/0x14e0 [ 1098.681409][ T26] arch_do_signal_or_restart+0xc3/0x1890 [ 1098.696944][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1098.702211][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1098.727096][ T26] ? _raw_spin_unlock+0x40/0x40 [ 1098.732016][ T26] ? get_sigframe_size+0x10/0x10 [ 1098.746915][ T26] ? force_sig_info_to_task+0x34a/0x470 [ 1098.752549][ T26] ? force_sig+0x114/0x1d0 [ 1098.773080][ T26] ? exit_to_user_mode_loop+0x39/0x130 [ 1098.779079][ T26] exit_to_user_mode_loop+0x97/0x130 [ 1098.784398][ T26] exit_to_user_mode_prepare+0xb1/0x140 [ 1098.809022][ T26] irqentry_exit_to_user_mode+0x5/0x40 [ 1098.814540][ T26] exc_general_protection+0x358/0x4f0 [ 1098.831679][ T26] ? vtime_user_enter+0x1eb/0x2d0 [ 1098.846928][ T26] ? __context_tracking_enter+0x5f/0x90 [ 1098.852581][ T26] asm_exc_general_protection+0x22/0x30 [ 1098.875413][ T26] RIP: 0033:0x7fa75c1c3db1 [ 1098.880267][ T26] RSP: 002b:00000000200004f0 EFLAGS: 00010217 [ 1098.886364][ T26] RAX: 0000000000000000 RBX: 00007fa75c2f1f80 RCX: 00007fa75c1c3da9 [ 1098.929376][ T26] RDX: 0000000020000500 RSI: 00000000200004f0 RDI: 0000000000280400 [ 1098.946919][ T26] RBP: 00007fa75c21047a R08: 0000000020000600 R09: 0000000020000600 [ 1098.957331][ T26] R10: 0000000020000540 R11: 0000000000000206 R12: 0000000000000000 [ 1098.965339][ T26] R13: 000000000000000b R14: 00007fa75c2f1f80 R15: 00007fff4ce60618 [ 1098.993018][ T26] [ 1098.996178][ T26] [ 1098.996178][ T26] Showing all locks held in the system: [ 1099.021565][ T26] 2 locks held by kworker/0:1/13: [ 1099.038429][ T26] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1099.076031][ T26] #1: ffffc90000d27d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1099.096913][ T26] 1 lock held by khungtaskd/26: [ 1099.101807][ T26] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1099.129229][ T26] 1 lock held by dhcpcd/3173: [ 1099.134037][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: __netlink_dump_start+0x12e/0x6f0 [ 1099.182590][ T26] 2 locks held by getty/3260: [ 1099.197344][ T26] #0: ffff88814b4c9098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1099.216914][ T26] #1: ffffc900024b32e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1099.236939][ T26] 4 locks held by kworker/u4:4/3583: [ 1099.242278][ T26] #0: ffff888142fdd138 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1099.276915][ T26] #1: ffffc90003157d20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1099.296924][ T26] #2: ffff888024ac2bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1099.316907][ T26] #3: ffff888024ac4990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x12b9/0x1570 [ 1099.326636][ T26] 3 locks held by kworker/u4:5/3608: [ 1099.358657][ T26] 5 locks held by kworker/u4:7/7231: [ 1099.363989][ T26] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1099.395234][ T26] #1: ffffc9000508fd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1099.419541][ T26] #2: ffffffff8d9cfe50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1099.446934][ T26] #3: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: ip6gre_exit_batch_net+0xc0/0x460 [ 1099.456798][ T26] #4: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1099.496909][ T26] 3 locks held by kworker/1:8/18818: [ 1099.502272][ T26] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1099.526385][ T26] #1: ffffc9000b447d20 ((work_completion)(&(&nsim_dev->trap_data->trap_report_dw)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1099.566925][ T26] #2: ffff88805e9e6400 (&nsim_dev->port_list_lock#2){+.+.}-{3:3}, at: nsim_dev_trap_report_work+0x56/0xab0 [ 1099.586913][ T26] 3 locks held by syz-executor.2/28061: [ 1099.597202][ T26] #0: ffff888024ac0460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1099.606527][ T26] #1: ffff888056fb5da8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1099.646918][ T26] #2: ffff888024ac00e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1099.677049][ T26] 3 locks held by syz-executor.2/28293: [ 1099.682657][ T26] 3 locks held by syz-executor.2/28312: [ 1099.707296][ T26] #0: ffff888024ac0460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1099.716655][ T26] #1: ffff888025617198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1099.743419][ T26] #2: ffff888024ac00e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1099.787160][ T26] 3 locks held by syz-executor.2/28375: [ 1099.792758][ T26] #0: ffff888024ac0460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1099.817009][ T26] #1: ffff888052e2a1d8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1099.856909][ T26] #2: ffff888024ac00e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1099.886957][ T26] 1 lock held by syz-executor.2/30098: [ 1099.892467][ T26] 3 locks held by syz-executor.2/30111: [ 1099.906925][ T26] 2 locks held by syz-executor.2/30126: [ 1099.912514][ T26] 2 locks held by syz-executor.1/30139: [ 1099.946936][ T26] #0: ffff888024ac2bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1099.977044][ T26] #1: ffff8880b9a3a318 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x26/0x140 [ 1099.996922][ T26] 2 locks held by syz-executor.1/30146: [ 1100.014137][ T26] 1 lock held by syz-executor.2/30149: [ 1100.026959][ T26] 3 locks held by syz-executor.1/30265: [ 1100.033925][ T26] 1 lock held by syz-executor.2/30266: [ 1100.057075][ T26] 1 lock held by syz-executor.2/30272: [ 1100.067177][ T26] 1 lock held by syz-executor.1/30285: [ 1100.072666][ T26] 1 lock held by syz-executor.2/30298: [ 1100.094997][ T26] 3 locks held by syz-executor.1/30301: [ 1100.104203][ T26] 2 locks held by syz-executor.2/30320: [ 1100.116921][ T26] 2 locks held by syz-executor.1/30321: [ 1100.127290][ T26] 2 locks held by syz-executor.1/30334: [ 1100.132862][ T26] 1 lock held by syz-executor.1/30347: [ 1100.146915][ T26] 4 locks held by syz-executor.1/31257: [ 1100.152489][ T26] #0: ffff88807ec32460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1100.184328][ T26] #1: ffff888079724c88 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1100.206616][ T26] #2: ffff88801e3fb660 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1100.246926][ T26] #3: ffffffff8d357a88 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1100.266914][ T26] 4 locks held by syz-executor.4/31262: [ 1100.272505][ T26] #0: ffff88807ec32460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1100.297682][ T26] #1: ffff888061722088 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1100.327106][ T26] #2: ffff88801e3fb660 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1100.346901][ T26] #3: ffffffff8d357a88 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1100.366961][ T26] 7 locks held by syz-executor.0/31264: [ 1100.372547][ T26] #0: ffff88807ec32460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1100.397036][ T26] #1: ffff88805a7d7088 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1100.422739][ T26] #2: ffff88801e3fb660 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1100.446152][ T26] #3: ffffffff8d357a88 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1100.467084][ T26] #4: ffff88805e9e5178 (&dev->mutex){....}-{3:3}, at: device_release_driver_internal+0xc2/0x7f0 [ 1100.486981][ T26] #5: ffff88805e9e6400 (&nsim_dev->port_list_lock#2){+.+.}-{3:3}, at: nsim_dev_reload_destroy+0x118/0x240 [ 1100.506193][ T26] #6: ffffffff8c923bf0 (rcu_state.barrier_mutex){+.+.}-{3:3}, at: rcu_barrier+0x9c/0x4e0 [ 1100.517025][ T26] 4 locks held by syz-executor.2/31267: [ 1100.522826][ T26] #0: ffff88807ec32460 (sb_writers#8){.+.+}-{0:0}, at: vfs_write+0x29a/0xe50 [ 1100.546986][ T26] #1: ffff8880605ea888 (&of->mutex){+.+.}-{3:3}, at: kernfs_fop_write_iter+0x1e7/0x4f0 [ 1100.556814][ T26] #2: ffff88801e3fb660 (kn->active#233){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x20b/0x4f0 [ 1100.567710][ T26] #3: ffffffff8d357a88 (nsim_bus_dev_list_lock){+.+.}-{3:3}, at: del_device_store+0xf1/0x470 [ 1100.577097][ T3567] Bluetooth: hci1: command 0x0409 tx timeout [ 1100.580069][ T26] 1 lock held by syz-executor.3/31458: [ 1100.589692][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1100.599609][ T26] 2 locks held by dhcpcd/31460: [ 1100.604892][ T26] #0: ffff88805fc00120 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xd50 [ 1100.626910][ T26] #1: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1100.664017][ T26] 1 lock held by dhcpcd/31461: [ 1100.696092][ T26] #0: ffff8880786b0120 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xd50 [ 1100.728051][ T26] [ 1100.730444][ T26] ============================================= [ 1100.730444][ T26] [ 1100.776971][ T26] NMI backtrace for cpu 0 [ 1100.781357][ T26] CPU: 0 PID: 26 Comm: khungtaskd Not tainted 5.15.152-syzkaller #0 [ 1100.789360][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1100.799434][ T26] Call Trace: [ 1100.802768][ T26] [ 1100.805711][ T26] dump_stack_lvl+0x1e3/0x2cb [ 1100.810487][ T26] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1100.816148][ T26] ? panic+0x84d/0x84d [ 1100.820235][ T26] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1100.825430][ T26] nmi_cpu_backtrace+0x46a/0x4a0 [ 1100.830396][ T26] ? __wake_up_klogd+0xd5/0x100 [ 1100.835295][ T26] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1100.841471][ T26] ? _printk+0xd1/0x111 [ 1100.845642][ T26] ? panic+0x84d/0x84d [ 1100.849738][ T26] ? __wake_up_klogd+0xcc/0x100 [ 1100.854613][ T26] ? panic+0x84d/0x84d [ 1100.858705][ T26] ? __rcu_read_unlock+0x92/0x100 [ 1100.863796][ T26] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1100.870036][ T26] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1100.876045][ T26] watchdog+0xe72/0xeb0 [ 1100.880296][ T26] kthread+0x3f6/0x4f0 [ 1100.884380][ T26] ? hungtask_pm_notify+0x50/0x50 [ 1100.889422][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1100.894023][ T26] ret_from_fork+0x1f/0x30 [ 1100.898560][ T26] [ 1100.902308][ T26] Sending NMI from CPU 0 to CPUs 1: [ 1100.907666][ C1] NMI backtrace for cpu 1 [ 1100.907677][ C1] CPU: 1 PID: 3608 Comm: kworker/u4:5 Not tainted 5.15.152-syzkaller #0 [ 1100.907696][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1100.907707][ C1] Workqueue: phy70 ieee80211_iface_work [ 1100.907806][ C1] RIP: 0010:__lock_acquire+0x7ab/0x1ff0 [ 1100.907825][ C1] Code: 00 41 8b 5d 00 81 e3 ff 1f 00 00 89 d8 c1 e8 06 48 8d 3c c5 c0 f0 bc 8f be 08 00 00 00 e8 6d 5e 67 00 48 0f a3 1d 55 57 5a 0e <73> 1b 48 8d 04 5b 48 c1 e0 06 48 8d 98 c0 4f 8c 8f 48 ba 00 00 00 [ 1100.907839][ C1] RSP: 0018:ffffc900031c7760 EFLAGS: 00000057 [ 1100.907852][ C1] RAX: 0000000000000001 RBX: 0000000000000a0c RCX: ffffffff81629963 [ 1100.907863][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff8fbcf200 [ 1100.907875][ C1] RBP: ffff88801c4d0b10 R08: dffffc0000000000 R09: fffffbfff1f79e41 [ 1100.907887][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 1100.907898][ C1] R13: ffff88801c4d0b10 R14: 0000000000000000 R15: ffff88801c4d0b04 [ 1100.907910][ C1] FS: 0000000000000000(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 1100.907925][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1100.907937][ C1] CR2: 00007fff654a8ca8 CR3: 0000000060265000 CR4: 00000000003506e0 [ 1100.907952][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1100.907961][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1100.907990][ C1] Call Trace: [ 1100.907994][ C1] [ 1100.908000][ C1] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1100.908021][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1100.908038][ C1] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1100.908064][ C1] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1100.908081][ C1] ? nmi_handle+0xf7/0x370 [ 1100.908099][ C1] ? __lock_acquire+0x7ab/0x1ff0 [ 1100.908114][ C1] ? default_do_nmi+0x62/0x150 [ 1100.908131][ C1] ? exc_nmi+0xab/0x120 [ 1100.908144][ C1] ? end_repeat_nmi+0x16/0x31 [ 1100.908165][ C1] ? __lock_acquire+0x7a3/0x1ff0 [ 1100.908180][ C1] ? __lock_acquire+0x7ab/0x1ff0 [ 1100.908196][ C1] ? __lock_acquire+0x7ab/0x1ff0 [ 1100.908211][ C1] ? __lock_acquire+0x7ab/0x1ff0 [ 1100.908226][ C1] [ 1100.908230][ C1] [ 1100.908241][ C1] lock_acquire+0x1db/0x4f0 [ 1100.908256][ C1] ? rcu_lock_acquire+0x5/0x30 [ 1100.908276][ C1] ? read_lock_is_recursive+0x10/0x10 [ 1100.908292][ C1] ? __lock_acquire+0x1295/0x1ff0 [ 1100.908307][ C1] ? mutex_lock_io_nested+0x60/0x60 [ 1100.908325][ C1] ? ieee80211_queue_delayed_work+0x160/0x160 [ 1100.908360][ C1] ? __lock_acquire+0x1295/0x1ff0 [ 1100.908377][ C1] ? ieee80211_get_channel_khz+0x16f/0x7a0 [ 1100.908436][ C1] rcu_lock_acquire+0x2a/0x30 [ 1100.908453][ C1] ? rcu_lock_acquire+0x5/0x30 [ 1100.908469][ C1] ieee80211_ibss_rx_queued_mgmt+0xd20/0x2af0 [ 1100.908489][ C1] ? mark_lock+0x98/0x340 [ 1100.908506][ C1] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1100.908527][ C1] ? ieee80211_ibss_rx_no_sta+0x720/0x720 [ 1100.908545][ C1] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1100.908564][ C1] ? lockdep_hardirqs_on+0x94/0x130 [ 1100.908581][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1100.908600][ C1] ? _raw_spin_unlock+0x40/0x40 [ 1100.908624][ C1] ? kcov_remote_start+0x76/0x490 [ 1100.908644][ C1] ? kcov_remote_start+0xf9/0x490 [ 1100.908664][ C1] ieee80211_iface_work+0x78f/0xcc0 [ 1100.908685][ C1] process_one_work+0x8a1/0x10c0 [ 1100.908709][ C1] ? worker_detach_from_pool+0x260/0x260 [ 1100.908729][ C1] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1100.908747][ C1] ? kthread_data+0x4e/0xc0 [ 1100.908763][ C1] ? wq_worker_running+0x97/0x170 [ 1100.908781][ C1] worker_thread+0xaca/0x1280 [ 1100.908799][ C1] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1100.908825][ C1] kthread+0x3f6/0x4f0 [ 1100.908840][ C1] ? rcu_lock_release+0x20/0x20 [ 1100.908857][ C1] ? kthread_blkcg+0xd0/0xd0 [ 1100.908874][ C1] ret_from_fork+0x1f/0x30 [ 1100.908898][ C1] [ 1101.182594][ T26] Kernel panic - not syncing: hung_task: blocked tasks [ 1101.182614][ T26] CPU: 0 PID: 26 Comm: khungtaskd Not tainted 5.15.152-syzkaller #0 [ 1101.182637][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1101.182650][ T26] Call Trace: [ 1101.182657][ T26] [ 1101.182666][ T26] dump_stack_lvl+0x1e3/0x2cb [ 1101.182698][ T26] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1101.182724][ T26] ? panic+0x84d/0x84d [ 1101.182756][ T26] panic+0x318/0x84d [ 1101.182789][ T26] ? schedule_preempt_disabled+0x20/0x20 [ 1101.182815][ T26] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1101.182842][ T26] ? fb_is_primary_device+0xcc/0xcc [ 1101.182865][ T26] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1101.182890][ T26] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1101.182915][ T26] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1101.182942][ T26] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1101.182970][ T26] watchdog+0xeb0/0xeb0 [ 1101.183002][ T26] kthread+0x3f6/0x4f0 [ 1101.183022][ T26] ? hungtask_pm_notify+0x50/0x50 [ 1101.183043][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1101.183065][ T26] ret_from_fork+0x1f/0x30 [ 1101.183100][ T26] [ 1101.183378][ T26] Kernel Offset: disabled [ 1101.530259][ T26] Rebooting in 86400 seconds..