f884e941559b068d908325667672b5e1cf71f4829c0493e8b141489ed926b822becead7a0a2b4a4c008ab16b616d60f347e4da54f06443507efe57ea62399ef4eb11b2f559e1b056456a53998bf1c6d13c92e75136147f91ae3a75ca15eb1b51bf700b3c0bf54bc3745ff313c5e75dc66386897f6ee45429371b8d0878c442ad2fe9baf85c1390da13efc353ccbef950c29f39ddf436f0d9bf1be1515ed251d8b6f11ecb16b1e8d1ed04196e9b6c2f9e068b7749bb6c1f533e493f22c901662c65cb761dc2eeff2f698bd4dbae83e2dfdc4f1c7f918a00515c1bc189d10ec22b35c92725cbf0ba244fd029c4f026f68e000000060000ab0476c3fd7f7c1e5c000000000000000000000011e43e39d3f4394fbfa13c416b1c443c5e52eea726491ad75100ebad7c6d5a665c59a3fb158e43da904f19e7e8daa4e90390b8da945f6cd78536c0d2be07221f85ad46b180f256d4d84592691d15d65896b66b63a46705338b67b72dc1c3075fcdc5cbffb0366151632ba5be8ae815dfea9fadfd31c473a24a73d3e5116c3023b3563c72d26fbd59877132bde5ca4ef8d92fd3613c768b35223f6fd0b5e9a8b98cccf1e2b4612e620e3a159d6365c9045aaa826aa0ee6d26cf0397ce674c20824584b464ebdc2f3ea26a7aec4570b242a6677a4e9187f8591c3a9bdc00006876c983ba0949f20c3159d10f4d787c65ef11966f88297b8bbdd398537d0890c20afbd4ec6f0a54ab977b6f35d2fbb1f53061b72402701fb16dc8e7c0074dade627293e7a980ae85fad62c792f683c84fb896ae08f7f6166e8b47c744102fb7bad314413f051ee77dfe34d94d35d9bf0bdf6c0a37440178e8c7ee0a97e16606d6ee9eaa822c8e6930151118dbd027040d7f37aa50f286576989c97b4e9e1995d7b56d722c2792f3f1c7f13f2d7dd0d3e8d28e0500000000000000000000000000000000000000000039c383fdba6a0fe531f1df755de307e87c8b2527412a0876af35f3cff1aeb9f0ad5a5635200b747be02ec89fc98f0b007a62237ff598378fe7f1bdb627aed5479d21f42ebd168b400e38cc92e92a75c634b7bb9f45a86e62c24cad55b64127b4cd40a6b690e5f3c5d119ad09178d7bf7ec12dff1bfb7d77399bdf339216a82b108955dd5e0edf104fc5b97145cd237821aada05f8f4223063749356338f9c773eeae4a060c51fac58a0a4c78c5e595c1f57690b267332a2da671215420e663d81db12889d2a02178b5f897327451c7069899f94a187355fcb9b7840c3beb229b4a996efde3cba8ece484"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r8, 0xfe, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff3c, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001380)={r8, 0xfe, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff3c, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r9}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={r10, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0xffffffffffffffee, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$inet(r2, &(0x7f0000000440)={&(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000080)="312f81bc6d695f810df45b7d9931d1ee37", 0x11}], 0x1, &(0x7f0000000400)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @local, @empty=0x7a}}}], 0x20, 0x7}, 0x0) (async) sendmsg$inet(r2, &(0x7f0000000440)={&(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000080)="312f81bc6d695f810df45b7d9931d1ee37", 0x11}], 0x1, &(0x7f0000000400)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @local, @empty=0x7a}}}], 0x20, 0x7}, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r12, 0x4004662b, &(0x7f00000005c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x10, &(0x7f0000000000)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x4, 0x1, 0x4, 0x3, 0x8, 0x2, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x79fe, 0xe6, &(0x7f00000002c0)=""/230, 0x40f00, 0x8, '\x00', r11, 0x0, r12, 0x8, &(0x7f0000000180)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xe, 0x6, 0xa0e9}, 0x10, 0x0, 0x0, 0x4, &(0x7f00000003c0)=[r0, r0, r0, r0], &(0x7f0000000400)=[{0x5, 0x4, 0x8, 0x5}, {0x1, 0x2, 0x1}, {0x5, 0x5, 0xe, 0x1}, {0x1, 0x22, 0x4, 0x2}], 0x10, 0x5fc}, 0x90) 06:14:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00200010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:32 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz0\x00', 0x200002, 0x0) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0x0, 0x100, 0x8}, 0xc) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0xffffffffffffffff, 0x1, 0x8}, 0xc) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000009c0)={0x1, 0x58, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002880)={0x6, 0x3, &(0x7f0000002580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xca}}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, r6, 0x8, &(0x7f0000002780), 0x8}, 0x90) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000900)={0x0, 0x80, 0x0, 0xdf, 0x0, 0x1, 0x0, 0x8001, 0x80080, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x6}, 0x0, 0x8001, 0x1, 0x9, 0xd, 0xb36, 0x3ab7, 0x0, 0x0, 0x0, 0x3}, r7, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xafffffffffffffff, r7, 0x9) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000b40)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7fffffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{0x1, 0xffffffffffffffff}, &(0x7f0000000a80), &(0x7f0000000bc0)=r0}, 0x20) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)=@generic={&(0x7f0000000c40)='./file0\x00'}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x18, &(0x7f0000000780)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xa44}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x0, 0x3, 0x0, 0x7, 0xa, 0xffffffffffffffc0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r3}}, @map_fd={0x18, 0x3, 0x1, 0x0, r4}]}, &(0x7f0000000840)='GPL\x00', 0x9, 0x85, &(0x7f0000000880)=""/133, 0x41000, 0x11, '\x00', r5, 0x0, r6, 0x8, &(0x7f0000000a00)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000a40)={0x4, 0x3, 0x7f, 0x1}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000cc0)=[r7, r8, r9, r10], &(0x7f0000000d00)=[{0x3, 0x4, 0xd, 0xb}, {0x0, 0x3, 0x3, 0x2}], 0x10, 0x1}, 0x90) r11 = openat$cgroup_ro(r1, &(0x7f0000000640)='devices.list\x00', 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x778983b105fe7367, 0x24, &(0x7f0000000e00)=ANY=[@ANYBLOB="18000000c0ef000000000000a2000000b7080000000000007b8af8ff00000000b7080000060000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000182a0000", @ANYRES32=r12, @ANYBLOB="dfbcb24bc6a4c9c8186500000e000000000000000300000085000000d00000009500000000000000b7080000000000007b8af8ff00000000b7080000010100007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300001a0f85ea3d431dbf3a6658d736895a54fbd651d23770b4338766c5cd8213f241e0", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a50000005cb51000f0ffffff9500000000000000"], &(0x7f0000000140)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x3, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x6, 0x1, 0x2}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000004c0)=[{0x1, 0x5, 0xf, 0x4}, {0x4, 0x2, 0x1, 0x6}, {0x2, 0x3, 0x10, 0x4}, {0x2, 0x4, 0x4, 0xc}, {0x3, 0x5, 0xe, 0x5}]}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1000, 0x89}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/103, &(0x7f0000000600), &(0x7f0000001b40), 0x80, r13, 0x0, 0x7}, 0x38) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xa, 0x1fc0, 0x360, 0x7, 0x2080, r13, 0x3ff, '\x00', 0x0, r11, 0x5, 0x1, 0x2}, 0x48) 06:14:32 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000016c0), 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x58, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x18, 0x2, &(0x7f00000005c0)=ANY=[@ANYBLOB="18260000", @ANYRES32, @ANYBLOB="ef81b23c6b5b0a79000084a190547c55f400"], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x0, &(0x7f00000001c0), 0x41000, 0x0, '\x00', r0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001540)={0x0, 0x4, 0xfffffffe, 0x4006}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000001580), &(0x7f00000015c0)=[{0x1, 0x1, 0x0, 0x2}, {0x1, 0x3, 0xe, 0xc}, {0x1, 0x2, 0x5, 0xa}]}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x81, 0x0, 0x0, 0x0, 0x0, 0x84, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000340), 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8) socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000a00)=ANY=[@ANYBLOB="18080000008cc22943422d0b000000000000008143a54935ad5936625fb4b824e920334c00c09730b6fb6b6da616149b984dabff10936cff547c7f8a8d6354051b00b82d5ce8ae352917648acdc07bd3586009000000000000001aebf7dc25c9bccda32463d2a7c1faf1529d83cfa467b2f4d1272fc124802c6747c9b9428e0e5d6f6758d785c792127e75f4242d05559973e6481d4808b63ee7d1eb2f0028117b000028581c6352f1f9a6ad0394061e2ad3393d9cc942c3c3e951aedc36ff8635914acde804a1af41581f2646ff21716b8c35f6f46ac756c9b75d7144e766439ffbfdd0f79c52b01f24a329ed9ae67f37d23cd2abea39fff335d985d599341b34dd1c3ffec2cea40ee7a06002931bd66f044fd8a5cc2da9b7ea1991841188ab3f0e7a8563", @ANYRES32, @ANYBLOB="00f8ff000000008aae0431c9f38800959fb66fb9aac86c"], &(0x7f0000000100)='syzkaller\x00', 0xa}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x4, 0x7, 0xac8, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x57) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='\x00') perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0xbe, 0x0, 0x3f, 0x20, 0x0, 0x1, 0x4248, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x2, 0x8}, 0x20, 0x882, 0x5, 0x6, 0x2, 0x6, 0xbc5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r2, 0x2) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) r5 = getpid() perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x9, 0xc1, 0x7f, 0x2, 0x0, 0x3, 0x83040, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x0, 0x20, 0x1, 0x5, 0x8, 0x7, 0xf78, 0x0, 0x8, 0x0, 0x5}, r5, 0x5, 0xffffffffffffffff, 0xb) r6 = syz_clone(0x520ca600, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x3, 0x7, 0x3, 0x60, 0x0, 0x10001, 0x82101, 0x2e30bfca5efe7f52, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffc1, 0x6, @perf_bp={&(0x7f0000000540), 0x5}, 0x1007, 0x9, 0xffffff01, 0x4, 0xa83, 0xa008, 0x5, 0x0, 0x9}, r6, 0x8, 0xffffffffffffffff, 0x9) [ 408.089827][ T9821] team_slave_0: left promiscuous mode 06:14:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 408.284375][ T9821] team0 (unregistering): Port device team_slave_0 removed [ 408.326844][ T9821] team_slave_1: left promiscuous mode 06:14:32 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 408.417783][ T9821] team0 (unregistering): Port device team_slave_1 removed 06:14:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e003f0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000012008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00480010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000016c0), 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x58, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x18, 0x2, &(0x7f00000005c0)=ANY=[@ANYBLOB="18260000", @ANYRES32, @ANYBLOB="ef81b23c6b5b0a79000084a190547c55f400"], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x0, &(0x7f00000001c0), 0x41000, 0x0, '\x00', r0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001540)={0x0, 0x4, 0xfffffffe, 0x4006}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000001580), &(0x7f00000015c0)=[{0x1, 0x1, 0x0, 0x2}, {0x1, 0x3, 0xe, 0xc}, {0x1, 0x2, 0x5, 0xa}]}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x81, 0x0, 0x0, 0x0, 0x0, 0x84, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000340), 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8) socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000a00)=ANY=[@ANYBLOB="18080000008cc22943422d0b000000000000008143a54935ad5936625fb4b824e920334c00c09730b6fb6b6da616149b984dabff10936cff547c7f8a8d6354051b00b82d5ce8ae352917648acdc07bd3586009000000000000001aebf7dc25c9bccda32463d2a7c1faf1529d83cfa467b2f4d1272fc124802c6747c9b9428e0e5d6f6758d785c792127e75f4242d05559973e6481d4808b63ee7d1eb2f0028117b000028581c6352f1f9a6ad0394061e2ad3393d9cc942c3c3e951aedc36ff8635914acde804a1af41581f2646ff21716b8c35f6f46ac756c9b75d7144e766439ffbfdd0f79c52b01f24a329ed9ae67f37d23cd2abea39fff335d985d599341b34dd1c3ffec2cea40ee7a06002931bd66f044fd8a5cc2da9b7ea1991841188ab3f0e7a8563", @ANYRES32, @ANYBLOB="00f8ff000000008aae0431c9f38800959fb66fb9aac86c"], &(0x7f0000000100)='syzkaller\x00', 0xa}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x4, 0x7, 0xac8, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x57) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='\x00') perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0xbe, 0x0, 0x3f, 0x20, 0x0, 0x1, 0x4248, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x2, 0x8}, 0x20, 0x882, 0x5, 0x6, 0x2, 0x6, 0xbc5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r2, 0x2) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) r5 = getpid() perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x9, 0xc1, 0x7f, 0x2, 0x0, 0x3, 0x83040, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x0, 0x20, 0x1, 0x5, 0x8, 0x7, 0xf78, 0x0, 0x8, 0x0, 0x5}, r5, 0x5, 0xffffffffffffffff, 0xb) r6 = syz_clone(0x520ca600, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x3, 0x7, 0x3, 0x60, 0x0, 0x10001, 0x82101, 0x2e30bfca5efe7f52, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffc1, 0x6, @perf_bp={&(0x7f0000000540), 0x5}, 0x1007, 0x9, 0xffffff01, 0x4, 0xa83, 0xa008, 0x5, 0x0, 0x9}, r6, 0x8, 0xffffffffffffffff, 0x9) 06:14:33 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:33 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}}, &(0x7f0000000000)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) close(r0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) 06:14:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e004c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000002f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000015c0)={0xffffffffffffffff, 0x58, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f0000001780)={&(0x7f0000001000)={0x2, 0x4e23, @local}, 0x10, &(0x7f00000014c0)=[{&(0x7f0000001040)="06156cd4232daad5a4d93d1b870ee34d731843f59553c9615b418bd768cbcb49f3ced1cc4ed182ada2b713c77bada955202b16c03710aa63da723618bf0db49a9436956e2ae00c5ff929a186c71277e3e94a35a64d2326541a83bbcfd5d76a63ae2b010099a9e328b43107edcedad95ad6502509596abd9136bfa2e520f1b611b9766c0e86d7fe16e836fc0a4499ca0abafe8f544005c7a6505546f3a04b2d6e169281bc70b1d007146a3129f2133f2a5088a1e06821f523790ac360736c4b224849fcae8ea123872e0ce5e28bd708ea50335140548242c93f96daa509b29bc9f69e3c0c82168771efe14264e570175de35a43", 0xf3}, {&(0x7f0000001140)="7e2a5b8b3255b319c725d8a226622de85913df090a42e4d331af1db638672b11f988b6e3c58eb44ad5a81c27dfff9f86e2b14179cf0f5e9a7192721604784faa5f4ea137f8445fc55c572f4e9a75429b82cc6bc2474d1458ddeae3b444263316d1a89805df96c411216c33688f0bb0dbc1f0e689993cbe53ff255ab4923abc436b70301199481690d3d8e17384144c1e27ac92121a11ff8ab18810d72f7856c5566d5a23893a11b13580d224da4c076e017592be6555042752918cf7f3ef87c8547c142925f03a2772f2d603e0a755c9b081db319130f009305ad1e2afcd2c", 0xdf}, {&(0x7f0000001240)="884fb10f64588cad95cd1ed202d90973f996e99b051716e6e52df9d975374f93ba5eb8980eb3efdfc1fb7b2df26bf12e9e3490dc2c6d12f684a0738ab6f5de243321271e5338de03cb7e6f670e2ae094a0cbb248cbb9e64e12f7aba873fda25962a04df80004b29375bb986c9cac03f674999f62001697f63475fb81c62d33e3f31ac04c37a74ce4004f886754ddeb7682d62167a5a75e9585765e245e793c1d3172610108899cf2f32b81e10b3ff00e2744d915f5c0e6f303f834bc24f782011fc82ada1eb32545bea545595862255096fba9504c89941eca07cb27702d", 0xde}, {&(0x7f0000001340)="4e8d3a2c6f8b01bd8ef88d986bf008ae1c17f3cb14824942fb0d3a11125be6407d17b221a61bead13ef035a52b412514845af6a92e6346ac25215ed8ca805ac83f8a89e732862d7866e9698a453e63fdeb88aaac4edd3f6863dce34ee78e6a386295034877905a3f804e012bda7d0d301803b2f65b222e371dbfc4ea51f41f2b7b71bbfb6683dcec4e042dbffa6e913ba5043268176196eeb960224b1ad75f82a6ef537cc73c70985ad829691f4113ecfd5ca41f69566a9a38b7b3794d66a25a4764d6b17b4f7abc6575fdaa412b7e960182bf9c791c0e09f8a3d08c6a8d9145208939db521715429e6d7657a7c4eec467163e33fc9e08f9", 0xf8}, {&(0x7f0000001440)="702a0bbd5676926e616ef6c7875a137b02321ea9a6918b4b8d2c94e5b54fc8b5d004db211a48642e849eed63bcc60f5a5939bfedf95b8e163cd22f2bc101b647fbfb989c489dbe6ba7deae356b867228cdda4012182e958fb139c412246b557131dfc2538d23dcc3d21e40b343480a32adff68699cca92860c", 0x79}], 0x5, &(0x7f0000001600)=[@ip_retopts={{0xe4, 0x0, 0x7, {[@ssrr={0x89, 0x2b, 0x92, [@empty, @dev={0xac, 0x14, 0x14, 0x1f}, @dev={0xac, 0x14, 0x14, 0xa}, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}, @loopback, @loopback, @dev, @multicast1]}, @lsrr={0x83, 0x1b, 0x9, [@local, @broadcast, @loopback, @multicast1, @multicast2, @broadcast]}, @cipso={0x86, 0x9, 0x3, [{0x1, 0x3, "06"}]}, @noop, @timestamp_addr={0x44, 0x34, 0xc4, 0x1, 0x6, [{@empty, 0x40}, {@multicast1, 0x9}, {@rand_addr=0x64010101, 0xffff}, {@remote, 0x6}, {@remote, 0x7}, {@multicast1, 0x2}]}, @timestamp_addr={0x44, 0x34, 0x7b, 0x1, 0x4, [{@rand_addr=0x64010102, 0xfff}, {@rand_addr=0x64010102, 0xffff0001}, {@remote, 0x7fffffff}, {@broadcast, 0x9}, {@loopback, 0x5}, {@multicast1, 0x3}]}, @lsrr={0x83, 0xb, 0x69, [@dev={0xac, 0x14, 0x14, 0x25}, @broadcast]}, @ssrr={0x89, 0xf, 0xb4, [@multicast2, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x11}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x97}}], 0x168}, 0x10) sendmsg$kcm(r2, &(0x7f0000000840)={&(0x7f00000000c0)=@xdp={0x2c, 0xd, r3, 0x1}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000140)="bed903ff3e6101784e2d5e31d80f5b6dadc283f8261e360098a71ff166f2f7a165fa17b38ffe626b48678002ce3938afccf982d2597192c2b6b341d6ed2bcb1d16b6cdbceb1ed639e28b2ccc51aa6944f6e469817dcdcc86e2486e378513a694c5cefd0b019cfb44cf371ec767fda920c432e5dd0fed87fb0131085082460dc2b244107924a825176872ef2118e43277b1c5afcaddc1ab6b788da8bf5284c2f997b430015edefe33bdb66188514cd6bf1ab0dbf18b070750815f1bb3f3e594d925277757c2b1176ff2be3a9a31cdfecccc4ff76bd84d0800c245b4fd9b569ade9890c15df99d9dedeea51e4ee6a3ab981c", 0xf1}, {&(0x7f0000000240)="27689db8d42a7d62147453d9d487b8532b5c4f21c73f19a9da34ee275b9f13d26c33cc57bbc11ad49da4b6a7d5c669ba7658968867a3b1ce1930d9da19439bb5ed9ed094edf74a885c5a600dcf4560f762cd3cb90d2228a43e8a11257834f0a2ede585fa47df208dea69c68fe14ee2fea815e003ab4ffee5d885e31da30390aeb334c313ec443b0ea9072975a14f4faae68fc2f3302f17d1e231c06f799d654e066736ff42668d282f0b6004d3c31dafeea9316ab553a734c15d1b08de6dec5f989ba978e4", 0xc5}, {&(0x7f0000000340)="5be1fd07fc8411cfc361dd348a7fd64af9a55960f60cfac9df8714fc3427a92ba0519566f27649b0d8eba52f963f03fada038f02d3e01129559574910ef654a1c83e9cda3e1b6b3756d5820c92c07409730e004c2d32114ddb8f5197470e18599a5660646746b72a465ed1fe9a2a6164119f6812e5d6874878330f54d398e98131759cc18e05c666eda09af7ca647a9643cb1fdd46c99c863919f14ffc8ef49a7a117cd0fe7c342f04ef5ed427a511f89d46d773516446081cde1679abca4164d8cf274818bbb720ad169f0b7b6c460a48e2b7f6", 0xd4}, {&(0x7f0000000440)="a91b795178a6720504fdae4fd7254659516ddda1188a6e33dfd2994f57e93c459b", 0x21}, {&(0x7f0000000480)="14b3248a2d4867f2e0d7dc78eefc93e079af03a18fd20402c139e26221bc4a5cde6592cf599006680ca507861e7205", 0x2f}, {&(0x7f00000004c0)="2449c10fd3c8462ca140267283571dbd3ffe567e9cfd27b603e1700854c831476f7fa6ee9ffeb68a190cf73f5e26036bae7467ef07e72674a58ad4fff2ff445681a8492698222cb45fb28f784e5f93434e28fcbaac7d00a2a63481e51620fdf9f1e6d025dc0db860edcaedcf8a59", 0x6e}, {&(0x7f0000000540)="c68e0b97a5f365ff1dc7e3883bb88f1638cece6938d770124ea062d0471996417aae9d53edac3aba1ebd61b3667d1d5c995a94b1aa418cb471a4bf7daa8d02c6f4a264a8ef863bcf", 0x48}, {&(0x7f0000000ac0)="58325f9acf16438f0ed3c70b16e84737f3d7e8f8abfc1d48992831a5cb3bedb05dbedb63b10962b32b8496e4688b2b22bfa7ccbdeb114b96fb79a310888c48b17e3d8d0e7c64b28a5175e1a90b568d86a804e0e3fc4d78cc70d89c0a49512fd0a4ee0d706473c0b499a5dc94a3637a0bb1ccad0c6f44da", 0x77}, {&(0x7f0000000640)="fa3b9ce9cf591c92b08241f86e0d4968de326e6f6a5b13ee346cffac499abbfe15a3fe108a7b1d7ef6d2474802004aae50e1b4d0891759a72ef34e93af0ec1b74cd4cc2520c35196eb2f95513a9d0be4d326764cf857352082c7a76fd2252fcea01d273d94ff33cee144f7a68b4d0565d283c20397f070083a1506ddcad030723946521a5e45597575f17c5d386e84853650d756539d68a72fed8e6991550bdfd2433f45ed36", 0xa6}], 0x9, &(0x7f0000000b40)=[{0x68, 0x119, 0x101, "cbc6d66aa6a515e132da739c519c883841c2ca233904f5592e4ef1e9c63232a8c103f7e4ff13816160da289b28035cc46a27c18f4f16dc20121cc8c1d850e5ceea00b8a132fa92bc27a77a7db80d915f0dec2b7cb0adfe17"}, {0x58, 0x108, 0x80000001, "4285315879b14a4beb577a76046ff0956a485c83ffcfb6b5e25ec712306cf46137cb060879b744e8ae106e012cfcd703a7dee9d3261040e9e99ec896bdb80b68d0"}], 0xc0}, 0x800) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000002e40)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000015c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="1c000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRESHEX, @ANYRES32, @ANYBLOB="00000473004a5c572cc9bf", @ANYRES32=0x0, @ANYRES32=r8, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="0003d200010000000204000001040000010000002000003f000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64=r6, @ANYRES32=0x0, @ANYRESDEC=r9], 0xe0, 0x20000001}, 0x0) write$cgroup_type(r6, &(0x7f0000002ec0), 0x9) r10 = gettid() sendmsg$unix(r0, &(0x7f0000002e00)={&(0x7f00000017c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001840)="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", 0xfd}, {&(0x7f0000001940)="a891a0f934a286444c6ab0224565b326eb8fda3a7922a1b357b6a0d19515b629f92f6a6c7edcbf302098559b9ce37b7e9cd9f1fadb7191cfc97035fdba92497763317d52eda2cb83f62c36fa8d0f4cf2ec8bf285d19859d28bd01305d1245dd28476d4143e4fc36b076628de267cc8ad27ee9cde774daddcca4b218b7e188402c9e4f5854da0837d3da7797cabf6530b13aefd0b6566cdd184f91b48e88906c3945bbdd726d943721a8261760f7d67406952c2a7f064c456a55e7fc7210d1b3427023dc68904bda9f6172ec107d8b51415cdf4fdb791e2ac033b", 0xda}, {&(0x7f0000001a40)="9d4a242dff651f403b6ea2ca595519baacbee06bea329d119a05910c", 0x1c}], 0x3, &(0x7f0000001ac0)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}], 0x58, 0x40}, 0x20040000) recvmsg$kcm(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000880)=""/181, 0xb5}, {&(0x7f0000000940)=""/28, 0x1c}], 0x2, &(0x7f00000009c0)=""/183, 0xb7}, 0x10000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f00000005c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000c00)="7db05f4108b841ed51cc4735b5a9360b3244f3c63f00aa93dd1b0050c24047b5ec50cdea2ea65a021ed42cb8e0b7a900f46291b41657117033a133b1114a93b74210b93a4c3424b93b4e6e8c143d952ba9db1c533b5d45e7ac3d5fe54439b41fb5b8e868c2f99512582dbf6869e66f2557430975a70425d9eb58fe183c46138b73da745aa62d8d2df4ff0d740812f426fbe0aba0a991536144da0608b73d308baa8d975fe34e7d6ef407b3de4fb11d80129ad84391120b8aaa6464c7e81b", 0xbe}, {&(0x7f0000000cc0)="8be675b0b98a51695dff810f5932d36154995a796ff4abe51be7bc4a415b42563f6250c0abe5c45e2abe9f4b31033b7f8af82c0ff2a874b5e79e618266f66ffc5be8deb4f78368c92e00772226dfdc8c5ff456e794064652245009384c99a7146c5afaa40ad0db051661526a2086a02a614149476615df875425040f345512a8234f201da7ac1c5006e573f6fe812980429fc2dee69844c6b5e45a616c095c011382c1691d8f1f5b488efc6e7c7b77ead9f2ec5e1c27e30442f3f19a12a8731c3c431df70964ff018680017400b13b4c032a8a36c640aaf5b6", 0xd9}, {&(0x7f00000007c0)="d6fdf5de9d13a63265b9fadbc2931499164a1cb6263d455efa2d071cd4e4519cf5cbd37c0ade2ade1a8781dfb74a1d54cb8aa0ef37e49b366dd5ed549414e3a69267050f9d8a6bf9400ef21d4a6faae0231f3acd46ddd54542", 0x59}, {&(0x7f0000000dc0)="a0909f63afb0ee9082249c2a50352ea60e614fabce514de9735f58ce4962cbc44c2dcf2ed7093ea39f8f614b48cbd14d5b9e084d20fbaa15159957d1", 0x3c}, {&(0x7f0000000e00)="c5d93c729354092469c11ff954b0372956718993a349112e33df68747e55a23affa0ea77539fbcffd9df83a87b20d3ea110eea990497783ba1f5dac2c213b06d3b5b99513db63267c7b7c32093b91e45b831fad4a944129cd5aef05a74087998a13537914c08b8f44b063e77bf5b807bf86342ec9bef02a6d1fbf14e04784d65373ba8d74d4e3600d49f8e003ef40d8634dc3d4e370c1a23178580852f03f472d9ddd086636856fe7b63918bc9c49a", 0xaf}, {&(0x7f0000000ec0)="091cf59bb863e6ba3d34fc4ca152cd235326e710aecac865a5c024c2b1eff9f07ee0508030c28868c6b5ae35dbdf920bd5496a522d2bd8d0e91011599bcb28c4cd3d2960ab6a933dfa08d140f3b1ed3417e94aa96251e977665903b76c0fda8378", 0x61}], 0x6, &(0x7f0000001b80)=[{0x100, 0x10c, 0x8, "11f5d20bfa99b90d891cbd1c6c01be6b68ff180d9e337b495ece366a3c8167260f621822e69d3e8ca8fbf07ecc92efb6839cae0471c3565dc908000b86a898a59ade360909fe56bbc025cf0e012125c99e87a92e90cd323836ebc81d5d58a04730ddbda458a44c04b953bc5a6c9497a8aec6371654c9c620d9c68ced1c66d811c828cdd760df7f375f5ba2788f9403f6f859df458614a3a202a6eec851096f9080c5bf62f3f3909701f961709ab6467d156038ec3d322d64f005ab04ba51cacdc3dd411bd51b54accd6793a4d036b6ba97dc292a14f5f21d62bd6b1f7de747ef603ca774cf9165ba081ea8f3"}, {0x80, 0x88, 0x0, "e33097c74dac9bfda9a8b06a22dc3754841f0bd3fd187f212bccfa72447eda4ce7a380e8748b66cecc82b796cf47e4a7721fe9ed3081b30752b481ae6b6642e14853a24152c1267d42b48fbf0f41597be8c01fe80255bcbed2ef172371d9531a2c899a289a4e64a35b24"}, {0xd0, 0x104, 0x2, "93443d3043b2551a77c13bd0e0edf994157e6e1c01d204471774cc86308dd79ce71fa63bac9043c3fd761c737c55e550b51780082da52c30eb2b4d3e09efa8401dad24d18567f3c3b15a52f5996192f24765e8e81b7eb9bd37863b743302037f06eaf8c8d8ffa9002c7928f03e6c324eedc2a8c4a8909868628c926bf36d81f44934e418b1345069599d0f88f44c754652a53fea3200354f84c709bb34ac963d88716e4ceca2982f4a735d68170d88d289ac4e5a01bdd7cfbc"}, {0x1010, 0x10d, 0x0, "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"}], 0x1260}, 0x20044010) 06:14:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e65580010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000010190000000000000200000000000000009500"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x2, 0xf6, 0x6, 0x80, 0x0, 0x85, 0x20008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffb52c, 0x2, @perf_config_ext={0x401, 0x200}, 0x90160, 0xfffffffffffffff9, 0x2b8, 0x5, 0x3, 0x6, 0x6, 0x0, 0x80000000, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r1, 0x4) 06:14:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000007b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000016c0), 0x0, 0x8, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x58, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x18, 0x2, &(0x7f00000005c0)=ANY=[@ANYBLOB="18260000", @ANYRES32, @ANYBLOB="ef81b23c6b5b0a79000084a190547c55f400"], &(0x7f0000000180)='syzkaller\x00', 0x8, 0x0, &(0x7f00000001c0), 0x41000, 0x0, '\x00', r0, 0xa, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001540)={0x0, 0x4, 0xfffffffe, 0x4006}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000001580), &(0x7f00000015c0)=[{0x1, 0x1, 0x0, 0x2}, {0x1, 0x3, 0xe, 0xc}, {0x1, 0x2, 0x5, 0xa}]}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x81, 0x0, 0x0, 0x0, 0x0, 0x84, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000340), 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x8}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8) socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x3, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x182, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffeffffffffffffb, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000a00)=ANY=[@ANYBLOB="18080000008cc22943422d0b000000000000008143a54935ad5936625fb4b824e920334c00c09730b6fb6b6da616149b984dabff10936cff547c7f8a8d6354051b00b82d5ce8ae352917648acdc07bd3586009000000000000001aebf7dc25c9bccda32463d2a7c1faf1529d83cfa467b2f4d1272fc124802c6747c9b9428e0e5d6f6758d785c792127e75f4242d05559973e6481d4808b63ee7d1eb2f0028117b000028581c6352f1f9a6ad0394061e2ad3393d9cc942c3c3e951aedc36ff8635914acde804a1af41581f2646ff21716b8c35f6f46ac756c9b75d7144e766439ffbfdd0f79c52b01f24a329ed9ae67f37d23cd2abea39fff335d985d599341b34dd1c3ffec2cea40ee7a06002931bd66f044fd8a5cc2da9b7ea1991841188ab3f0e7a8563", @ANYRES32, @ANYBLOB="00f8ff000000008aae0431c9f38800959fb66fb9aac86c"], &(0x7f0000000100)='syzkaller\x00', 0xa}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x4, 0x7, 0xac8, r1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x57) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000500)='\x00') perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0xbe, 0x0, 0x3f, 0x20, 0x0, 0x1, 0x4248, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x2, 0x8}, 0x20, 0x882, 0x5, 0x6, 0x2, 0x6, 0xbc5, 0x0, 0x5}, 0xffffffffffffffff, 0x0, r2, 0x2) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) r5 = getpid() perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x9, 0xc1, 0x7f, 0x2, 0x0, 0x3, 0x83040, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x6}, 0x0, 0x20, 0x1, 0x5, 0x8, 0x7, 0xf78, 0x0, 0x8, 0x0, 0x5}, r5, 0x5, 0xffffffffffffffff, 0xb) r6 = syz_clone(0x520ca600, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x80}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x3, 0x7, 0x3, 0x60, 0x0, 0x10001, 0x82101, 0x2e30bfca5efe7f52, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffffffc1, 0x6, @perf_bp={&(0x7f0000000540), 0x5}, 0x1007, 0x9, 0xffffff01, 0x4, 0xa83, 0xa008, 0x5, 0x0, 0x9}, r6, 0x8, 0xffffffffffffffff, 0x9) 06:14:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00600010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000010190000000000000200000000000000009500"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x2, 0xf6, 0x6, 0x80, 0x0, 0x85, 0x20008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffb52c, 0x2, @perf_config_ext={0x401, 0x200}, 0x90160, 0xfffffffffffffff9, 0x2b8, 0x5, 0x3, 0x6, 0x6, 0x0, 0x80000000, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x5) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r1, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000010190000000000000200000000000000009500"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x2, 0xf6, 0x6, 0x80, 0x0, 0x85, 0x20008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffb52c, 0x2, @perf_config_ext={0x401, 0x200}, 0x90160, 0xfffffffffffffff9, 0x2b8, 0x5, 0x3, 0x6, 0x6, 0x0, 0x80000000, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x5) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r1, 0x4) (async) 06:14:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e58650010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00f00000008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:33 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000010190000000000000200000000000000009500"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x2, 0xf6, 0x6, 0x80, 0x0, 0x85, 0x20008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffb52c, 0x2, @perf_config_ext={0x401, 0x200}, 0x90160, 0xfffffffffffffff9, 0x2b8, 0x5, 0x3, 0x6, 0x6, 0x0, 0x80000000, 0x0, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x5) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r1, 0x4) 06:14:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00680010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000b003008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40286608, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80001, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x1}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xa, &(0x7f00000005c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe}, @map_val={0x18, 0x4, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000001c0)='GPL\x00', 0xffff, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x1, 0x4, 0x4, 0x7}, 0x10, 0x0, r6, 0x2, 0x0, &(0x7f0000000440)=[{0x3, 0x1, 0x5, 0x2}, {0x4, 0x3, 0xf, 0x9}], 0x10, 0x80000000}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="f17f2c3b9fa9920797df0d40cc4d57364a08e51c6d80e8e7555c1b9ee3ab5f4b151156938fded57beb670257e5efd4ef9d0591833f7891dc45959107b7ad3c8fbd57c039a94e973c8efff7edd2447125aa3c123c1c3e590b16ea3ce3434b4f669f0855cad902b512fdc830be5a45c6f13dfe71b542b283089ba6a4924033e7e9588bd00f71b0e687fbf046e186ecbd8e83f03194c618e843a1a705e9300bf0e7fdd2d995bf687a", 0xa7}], 0x1, &(0x7f0000000040)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, r0, r0, r0]}}], 0x40, 0x40040}, 0x44001) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x0, 0x5a, 0x3, 0x0, 0x4, 0x40, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7ff, 0xe513}, 0x2000, 0x2, 0x4, 0x8, 0xe5, 0x7ff, 0x3, 0x0, 0x1f}, 0x0, 0x10, r1, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) 06:14:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00020010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e006c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b40)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000015c0)={0xffffffffffffffff, 0x58, &(0x7f0000001540)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000015c0)={0xffffffffffffffff, 0x58, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f0000001780)={&(0x7f0000001000)={0x2, 0x4e23, @local}, 0x10, &(0x7f00000014c0)=[{&(0x7f0000001040)="06156cd4232daad5a4d93d1b870ee34d731843f59553c9615b418bd768cbcb49f3ced1cc4ed182ada2b713c77bada955202b16c03710aa63da723618bf0db49a9436956e2ae00c5ff929a186c71277e3e94a35a64d2326541a83bbcfd5d76a63ae2b010099a9e328b43107edcedad95ad6502509596abd9136bfa2e520f1b611b9766c0e86d7fe16e836fc0a4499ca0abafe8f544005c7a6505546f3a04b2d6e169281bc70b1d007146a3129f2133f2a5088a1e06821f523790ac360736c4b224849fcae8ea123872e0ce5e28bd708ea50335140548242c93f96daa509b29bc9f69e3c0c82168771efe14264e570175de35a43", 0xf3}, {&(0x7f0000001140)="7e2a5b8b3255b319c725d8a226622de85913df090a42e4d331af1db638672b11f988b6e3c58eb44ad5a81c27dfff9f86e2b14179cf0f5e9a7192721604784faa5f4ea137f8445fc55c572f4e9a75429b82cc6bc2474d1458ddeae3b444263316d1a89805df96c411216c33688f0bb0dbc1f0e689993cbe53ff255ab4923abc436b70301199481690d3d8e17384144c1e27ac92121a11ff8ab18810d72f7856c5566d5a23893a11b13580d224da4c076e017592be6555042752918cf7f3ef87c8547c142925f03a2772f2d603e0a755c9b081db319130f009305ad1e2afcd2c", 0xdf}, {&(0x7f0000001240)="884fb10f64588cad95cd1ed202d90973f996e99b051716e6e52df9d975374f93ba5eb8980eb3efdfc1fb7b2df26bf12e9e3490dc2c6d12f684a0738ab6f5de243321271e5338de03cb7e6f670e2ae094a0cbb248cbb9e64e12f7aba873fda25962a04df80004b29375bb986c9cac03f674999f62001697f63475fb81c62d33e3f31ac04c37a74ce4004f886754ddeb7682d62167a5a75e9585765e245e793c1d3172610108899cf2f32b81e10b3ff00e2744d915f5c0e6f303f834bc24f782011fc82ada1eb32545bea545595862255096fba9504c89941eca07cb27702d", 0xde}, {&(0x7f0000001340)="4e8d3a2c6f8b01bd8ef88d986bf008ae1c17f3cb14824942fb0d3a11125be6407d17b221a61bead13ef035a52b412514845af6a92e6346ac25215ed8ca805ac83f8a89e732862d7866e9698a453e63fdeb88aaac4edd3f6863dce34ee78e6a386295034877905a3f804e012bda7d0d301803b2f65b222e371dbfc4ea51f41f2b7b71bbfb6683dcec4e042dbffa6e913ba5043268176196eeb960224b1ad75f82a6ef537cc73c70985ad829691f4113ecfd5ca41f69566a9a38b7b3794d66a25a4764d6b17b4f7abc6575fdaa412b7e960182bf9c791c0e09f8a3d08c6a8d9145208939db521715429e6d7657a7c4eec467163e33fc9e08f9", 0xf8}, {&(0x7f0000001440)="702a0bbd5676926e616ef6c7875a137b02321ea9a6918b4b8d2c94e5b54fc8b5d004db211a48642e849eed63bcc60f5a5939bfedf95b8e163cd22f2bc101b647fbfb989c489dbe6ba7deae356b867228cdda4012182e958fb139c412246b557131dfc2538d23dcc3d21e40b343480a32adff68699cca92860c", 0x79}], 0x5, &(0x7f0000001600)=[@ip_retopts={{0xe4, 0x0, 0x7, {[@ssrr={0x89, 0x2b, 0x92, [@empty, @dev={0xac, 0x14, 0x14, 0x1f}, @dev={0xac, 0x14, 0x14, 0xa}, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}, @loopback, @loopback, @dev, @multicast1]}, @lsrr={0x83, 0x1b, 0x9, [@local, @broadcast, @loopback, @multicast1, @multicast2, @broadcast]}, @cipso={0x86, 0x9, 0x3, [{0x1, 0x3, "06"}]}, @noop, @timestamp_addr={0x44, 0x34, 0xc4, 0x1, 0x6, [{@empty, 0x40}, {@multicast1, 0x9}, {@rand_addr=0x64010101, 0xffff}, {@remote, 0x6}, {@remote, 0x7}, {@multicast1, 0x2}]}, @timestamp_addr={0x44, 0x34, 0x7b, 0x1, 0x4, [{@rand_addr=0x64010102, 0xfff}, {@rand_addr=0x64010102, 0xffff0001}, {@remote, 0x7fffffff}, {@broadcast, 0x9}, {@loopback, 0x5}, {@multicast1, 0x3}]}, @lsrr={0x83, 0xb, 0x69, [@dev={0xac, 0x14, 0x14, 0x25}, @broadcast]}, @ssrr={0x89, 0xf, 0xb4, [@multicast2, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x11}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x97}}], 0x168}, 0x10) sendmsg$kcm(r2, &(0x7f0000000840)={&(0x7f00000000c0)=@xdp={0x2c, 0xd, r3, 0x1}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000140)="bed903ff3e6101784e2d5e31d80f5b6dadc283f8261e360098a71ff166f2f7a165fa17b38ffe626b48678002ce3938afccf982d2597192c2b6b341d6ed2bcb1d16b6cdbceb1ed639e28b2ccc51aa6944f6e469817dcdcc86e2486e378513a694c5cefd0b019cfb44cf371ec767fda920c432e5dd0fed87fb0131085082460dc2b244107924a825176872ef2118e43277b1c5afcaddc1ab6b788da8bf5284c2f997b430015edefe33bdb66188514cd6bf1ab0dbf18b070750815f1bb3f3e594d925277757c2b1176ff2be3a9a31cdfecccc4ff76bd84d0800c245b4fd9b569ade9890c15df99d9dedeea51e4ee6a3ab981c", 0xf1}, {&(0x7f0000000240)="27689db8d42a7d62147453d9d487b8532b5c4f21c73f19a9da34ee275b9f13d26c33cc57bbc11ad49da4b6a7d5c669ba7658968867a3b1ce1930d9da19439bb5ed9ed094edf74a885c5a600dcf4560f762cd3cb90d2228a43e8a11257834f0a2ede585fa47df208dea69c68fe14ee2fea815e003ab4ffee5d885e31da30390aeb334c313ec443b0ea9072975a14f4faae68fc2f3302f17d1e231c06f799d654e066736ff42668d282f0b6004d3c31dafeea9316ab553a734c15d1b08de6dec5f989ba978e4", 0xc5}, {&(0x7f0000000340)="5be1fd07fc8411cfc361dd348a7fd64af9a55960f60cfac9df8714fc3427a92ba0519566f27649b0d8eba52f963f03fada038f02d3e01129559574910ef654a1c83e9cda3e1b6b3756d5820c92c07409730e004c2d32114ddb8f5197470e18599a5660646746b72a465ed1fe9a2a6164119f6812e5d6874878330f54d398e98131759cc18e05c666eda09af7ca647a9643cb1fdd46c99c863919f14ffc8ef49a7a117cd0fe7c342f04ef5ed427a511f89d46d773516446081cde1679abca4164d8cf274818bbb720ad169f0b7b6c460a48e2b7f6", 0xd4}, {&(0x7f0000000440)="a91b795178a6720504fdae4fd7254659516ddda1188a6e33dfd2994f57e93c459b", 0x21}, {&(0x7f0000000480)="14b3248a2d4867f2e0d7dc78eefc93e079af03a18fd20402c139e26221bc4a5cde6592cf599006680ca507861e7205", 0x2f}, {&(0x7f00000004c0)="2449c10fd3c8462ca140267283571dbd3ffe567e9cfd27b603e1700854c831476f7fa6ee9ffeb68a190cf73f5e26036bae7467ef07e72674a58ad4fff2ff445681a8492698222cb45fb28f784e5f93434e28fcbaac7d00a2a63481e51620fdf9f1e6d025dc0db860edcaedcf8a59", 0x6e}, {&(0x7f0000000540)="c68e0b97a5f365ff1dc7e3883bb88f1638cece6938d770124ea062d0471996417aae9d53edac3aba1ebd61b3667d1d5c995a94b1aa418cb471a4bf7daa8d02c6f4a264a8ef863bcf", 0x48}, {&(0x7f0000000ac0)="58325f9acf16438f0ed3c70b16e84737f3d7e8f8abfc1d48992831a5cb3bedb05dbedb63b10962b32b8496e4688b2b22bfa7ccbdeb114b96fb79a310888c48b17e3d8d0e7c64b28a5175e1a90b568d86a804e0e3fc4d78cc70d89c0a49512fd0a4ee0d706473c0b499a5dc94a3637a0bb1ccad0c6f44da", 0x77}, {&(0x7f0000000640)="fa3b9ce9cf591c92b08241f86e0d4968de326e6f6a5b13ee346cffac499abbfe15a3fe108a7b1d7ef6d2474802004aae50e1b4d0891759a72ef34e93af0ec1b74cd4cc2520c35196eb2f95513a9d0be4d326764cf857352082c7a76fd2252fcea01d273d94ff33cee144f7a68b4d0565d283c20397f070083a1506ddcad030723946521a5e45597575f17c5d386e84853650d756539d68a72fed8e6991550bdfd2433f45ed36", 0xa6}], 0x9, &(0x7f0000000b40)=[{0x68, 0x119, 0x101, "cbc6d66aa6a515e132da739c519c883841c2ca233904f5592e4ef1e9c63232a8c103f7e4ff13816160da289b28035cc46a27c18f4f16dc20121cc8c1d850e5ceea00b8a132fa92bc27a77a7db80d915f0dec2b7cb0adfe17"}, {0x58, 0x108, 0x80000001, "4285315879b14a4beb577a76046ff0956a485c83ffcfb6b5e25ec712306cf46137cb060879b744e8ae106e012cfcd703a7dee9d3261040e9e99ec896bdb80b68d0"}], 0xc0}, 0x800) r5 = gettid() r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000002e40)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000015c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="1c000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRESHEX, @ANYRES32, @ANYBLOB="00000473004a5c572cc9bf", @ANYRES32=0x0, @ANYRES32=r8, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="0003d200010000000204000001040000010000002000003f000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64=r6, @ANYRES32=0x0, @ANYRESDEC=r9], 0xe0, 0x20000001}, 0x0) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="1c000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRESHEX, @ANYRES32, @ANYBLOB="00000473004a5c572cc9bf", @ANYRES32=0x0, @ANYRES32=r8, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="0003d200010000000204000001040000010000002000003f000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64=r6, @ANYRES32=0x0, @ANYRESDEC=r9], 0xe0, 0x20000001}, 0x0) write$cgroup_type(r6, &(0x7f0000002ec0), 0x9) r10 = gettid() sendmsg$unix(r0, &(0x7f0000002e00)={&(0x7f00000017c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001840)="415f0d10699b55758d38c6120bfe2ca43fa8ce8a17d2790c81dfc78b961374b6b17795cde369ded5322217629a25e4fa4b2ac4b05a54efe3a81a39ff518be2e1a763678853e59e77b46428d3b73ce97ad60e36e46dbcfefbd5f84e8eb3653bc0e0b3e329b21fbde6519ec72f0cf2382780b508be3e81525724ef2d39ad0680d58fc967dadb15c9ff45cc6269a9686b11f09d80cb38b5dea2a52a614f7aeb0284d350b2b11474399dcaecf1f7ee9222f0d169d2c9f2b94302b9d4d29c45c4b8244abfabdc5504f5df0576cab9865c5326a4567520ef3f0bd76b49237fb044a3343c4f4681a3cc3066bcc3cf4f376d6c63312466819282f7ffaff03b7009", 0xfd}, {&(0x7f0000001940)="a891a0f934a286444c6ab0224565b326eb8fda3a7922a1b357b6a0d19515b629f92f6a6c7edcbf302098559b9ce37b7e9cd9f1fadb7191cfc97035fdba92497763317d52eda2cb83f62c36fa8d0f4cf2ec8bf285d19859d28bd01305d1245dd28476d4143e4fc36b076628de267cc8ad27ee9cde774daddcca4b218b7e188402c9e4f5854da0837d3da7797cabf6530b13aefd0b6566cdd184f91b48e88906c3945bbdd726d943721a8261760f7d67406952c2a7f064c456a55e7fc7210d1b3427023dc68904bda9f6172ec107d8b51415cdf4fdb791e2ac033b", 0xda}, {&(0x7f0000001a40)="9d4a242dff651f403b6ea2ca595519baacbee06bea329d119a05910c", 0x1c}], 0x3, &(0x7f0000001ac0)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}], 0x58, 0x40}, 0x20040000) recvmsg$kcm(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000880)=""/181, 0xb5}, {&(0x7f0000000940)=""/28, 0x1c}], 0x2, &(0x7f00000009c0)=""/183, 0xb7}, 0x10000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f00000005c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000c00)="7db05f4108b841ed51cc4735b5a9360b3244f3c63f00aa93dd1b0050c24047b5ec50cdea2ea65a021ed42cb8e0b7a900f46291b41657117033a133b1114a93b74210b93a4c3424b93b4e6e8c143d952ba9db1c533b5d45e7ac3d5fe54439b41fb5b8e868c2f99512582dbf6869e66f2557430975a70425d9eb58fe183c46138b73da745aa62d8d2df4ff0d740812f426fbe0aba0a991536144da0608b73d308baa8d975fe34e7d6ef407b3de4fb11d80129ad84391120b8aaa6464c7e81b", 0xbe}, {&(0x7f0000000cc0)="8be675b0b98a51695dff810f5932d36154995a796ff4abe51be7bc4a415b42563f6250c0abe5c45e2abe9f4b31033b7f8af82c0ff2a874b5e79e618266f66ffc5be8deb4f78368c92e00772226dfdc8c5ff456e794064652245009384c99a7146c5afaa40ad0db051661526a2086a02a614149476615df875425040f345512a8234f201da7ac1c5006e573f6fe812980429fc2dee69844c6b5e45a616c095c011382c1691d8f1f5b488efc6e7c7b77ead9f2ec5e1c27e30442f3f19a12a8731c3c431df70964ff018680017400b13b4c032a8a36c640aaf5b6", 0xd9}, {&(0x7f00000007c0)="d6fdf5de9d13a63265b9fadbc2931499164a1cb6263d455efa2d071cd4e4519cf5cbd37c0ade2ade1a8781dfb74a1d54cb8aa0ef37e49b366dd5ed549414e3a69267050f9d8a6bf9400ef21d4a6faae0231f3acd46ddd54542", 0x59}, {&(0x7f0000000dc0)="a0909f63afb0ee9082249c2a50352ea60e614fabce514de9735f58ce4962cbc44c2dcf2ed7093ea39f8f614b48cbd14d5b9e084d20fbaa15159957d1", 0x3c}, {&(0x7f0000000e00)="c5d93c729354092469c11ff954b0372956718993a349112e33df68747e55a23affa0ea77539fbcffd9df83a87b20d3ea110eea990497783ba1f5dac2c213b06d3b5b99513db63267c7b7c32093b91e45b831fad4a944129cd5aef05a74087998a13537914c08b8f44b063e77bf5b807bf86342ec9bef02a6d1fbf14e04784d65373ba8d74d4e3600d49f8e003ef40d8634dc3d4e370c1a23178580852f03f472d9ddd086636856fe7b63918bc9c49a", 0xaf}, {&(0x7f0000000ec0)="091cf59bb863e6ba3d34fc4ca152cd235326e710aecac865a5c024c2b1eff9f07ee0508030c28868c6b5ae35dbdf920bd5496a522d2bd8d0e91011599bcb28c4cd3d2960ab6a933dfa08d140f3b1ed3417e94aa96251e977665903b76c0fda8378", 0x61}], 0x6, &(0x7f0000001b80)=[{0x100, 0x10c, 0x8, "11f5d20bfa99b90d891cbd1c6c01be6b68ff180d9e337b495ece366a3c8167260f621822e69d3e8ca8fbf07ecc92efb6839cae0471c3565dc908000b86a898a59ade360909fe56bbc025cf0e012125c99e87a92e90cd323836ebc81d5d58a04730ddbda458a44c04b953bc5a6c9497a8aec6371654c9c620d9c68ced1c66d811c828cdd760df7f375f5ba2788f9403f6f859df458614a3a202a6eec851096f9080c5bf62f3f3909701f961709ab6467d156038ec3d322d64f005ab04ba51cacdc3dd411bd51b54accd6793a4d036b6ba97dc292a14f5f21d62bd6b1f7de747ef603ca774cf9165ba081ea8f3"}, {0x80, 0x88, 0x0, "e33097c74dac9bfda9a8b06a22dc3754841f0bd3fd187f212bccfa72447eda4ce7a380e8748b66cecc82b796cf47e4a7721fe9ed3081b30752b481ae6b6642e14853a24152c1267d42b48fbf0f41597be8c01fe80255bcbed2ef172371d9531a2c899a289a4e64a35b24"}, {0xd0, 0x104, 0x2, "93443d3043b2551a77c13bd0e0edf994157e6e1c01d204471774cc86308dd79ce71fa63bac9043c3fd761c737c55e550b51780082da52c30eb2b4d3e09efa8401dad24d18567f3c3b15a52f5996192f24765e8e81b7eb9bd37863b743302037f06eaf8c8d8ffa9002c7928f03e6c324eedc2a8c4a8909868628c926bf36d81f44934e418b1345069599d0f88f44c754652a53fea3200354f84c709bb34ac963d88716e4ceca2982f4a735d68170d88d289ac4e5a01bdd7cfbc"}, {0x1010, 0x10d, 0x0, "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"}], 0x1260}, 0x20044010) 06:14:34 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x4) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:34 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00740010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00030010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e007a0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00040010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0xffffffff, 0x3, 0x465, 0x10, r2, 0x2fcb, '\x00', 0x0, r2, 0x0, 0x0, 0x5, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x3a, &(0x7f0000000380)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3e81}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x2, 0x0, 0x1, 0x6, 0x8, 0x8, 0xfffffffffffffffc}, @ldst={0x1, 0x2, 0x3, 0x8, 0x5, 0x10, 0x4}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfbc}}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], &(0x7f0000000040)='GPL\x00', 0x8, 0xca, &(0x7f0000000580)=""/202, 0x41100, 0x67, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0xe, 0x55000000, 0xd3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r2, r1, r1, r2, r2, r4], &(0x7f0000000300), 0x10, 0x9}, 0x90) 06:14:34 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40286608, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80001, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x1}) (async) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x1}) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xa, &(0x7f00000005c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe}, @map_val={0x18, 0x4, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000001c0)='GPL\x00', 0xffff, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x1, 0x4, 0x4, 0x7}, 0x10, 0x0, r6, 0x2, 0x0, &(0x7f0000000440)=[{0x3, 0x1, 0x5, 0x2}, {0x4, 0x3, 0xf, 0x9}], 0x10, 0x80000000}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="f17f2c3b9fa9920797df0d40cc4d57364a08e51c6d80e8e7555c1b9ee3ab5f4b151156938fded57beb670257e5efd4ef9d0591833f7891dc45959107b7ad3c8fbd57c039a94e973c8efff7edd2447125aa3c123c1c3e590b16ea3ce3434b4f669f0855cad902b512fdc830be5a45c6f13dfe71b542b283089ba6a4924033e7e9588bd00f71b0e687fbf046e186ecbd8e83f03194c618e843a1a705e9300bf0e7fdd2d995bf687a", 0xa7}], 0x1, &(0x7f0000000040)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, r0, r0, r0]}}], 0x40, 0x40040}, 0x44001) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="f17f2c3b9fa9920797df0d40cc4d57364a08e51c6d80e8e7555c1b9ee3ab5f4b151156938fded57beb670257e5efd4ef9d0591833f7891dc45959107b7ad3c8fbd57c039a94e973c8efff7edd2447125aa3c123c1c3e590b16ea3ce3434b4f669f0855cad902b512fdc830be5a45c6f13dfe71b542b283089ba6a4924033e7e9588bd00f71b0e687fbf046e186ecbd8e83f03194c618e843a1a705e9300bf0e7fdd2d995bf687a", 0xa7}], 0x1, &(0x7f0000000040)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, r0, r0, r0]}}], 0x40, 0x40040}, 0x44001) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x0, 0x5a, 0x3, 0x0, 0x4, 0x40, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7ff, 0xe513}, 0x2000, 0x2, 0x4, 0x8, 0xe5, 0x7ff, 0x3, 0x0, 0x1f}, 0x0, 0x10, r1, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x0, 0x5a, 0x3, 0x0, 0x4, 0x40, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7ff, 0xe513}, 0x2000, 0x2, 0x4, 0x8, 0xe5, 0x7ff, 0x3, 0x0, 0x1f}, 0x0, 0x10, r1, 0x0) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) 06:14:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00810010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0da90010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:34 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1, 0xffffffffffffffff}, 0x4) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0xffffffff, 0x3, 0x465, 0x10, r2, 0x2fcb, '\x00', 0x0, r2, 0x0, 0x0, 0x5, 0x6}, 0x48) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x3a, &(0x7f0000000380)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3e81}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x2, 0x0, 0x1, 0x6, 0x8, 0x8, 0xfffffffffffffffc}, @ldst={0x1, 0x2, 0x3, 0x8, 0x5, 0x10, 0x4}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfbc}}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], &(0x7f0000000040)='GPL\x00', 0x8, 0xca, &(0x7f0000000580)=""/202, 0x41100, 0x67, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0xe, 0x55000000, 0xd3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r2, r1, r1, r2, r2, r4], &(0x7f0000000300), 0x10, 0x9}, 0x90) 06:14:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00050010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1, 0xffffffffffffffff}, 0x4) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0xffffffff, 0x3, 0x465, 0x10, r2, 0x2fcb, '\x00', 0x0, r2, 0x0, 0x0, 0x5, 0x6}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x3a, &(0x7f0000000380)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3e81}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @ldst={0x2, 0x0, 0x1, 0x6, 0x8, 0x8, 0xfffffffffffffffc}, @ldst={0x1, 0x2, 0x3, 0x8, 0x5, 0x10, 0x4}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfbc}}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x7}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], &(0x7f0000000040)='GPL\x00', 0x8, 0xca, &(0x7f0000000580)=""/202, 0x41100, 0x67, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0xe, 0x55000000, 0xd3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[r2, r1, r1, r2, r2, r4], &(0x7f0000000300), 0x10, 0x9}, 0x90) 06:14:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0daa0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.time\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00060010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = socket$kcm(0x29, 0x5, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0x1, 0x58, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000015c0)={0xffffffffffffffff, 0x58, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f0000001780)={&(0x7f0000001000)={0x2, 0x4e23, @local}, 0x10, &(0x7f00000014c0)=[{&(0x7f0000001040)="06156cd4232daad5a4d93d1b870ee34d731843f59553c9615b418bd768cbcb49f3ced1cc4ed182ada2b713c77bada955202b16c03710aa63da723618bf0db49a9436956e2ae00c5ff929a186c71277e3e94a35a64d2326541a83bbcfd5d76a63ae2b010099a9e328b43107edcedad95ad6502509596abd9136bfa2e520f1b611b9766c0e86d7fe16e836fc0a4499ca0abafe8f544005c7a6505546f3a04b2d6e169281bc70b1d007146a3129f2133f2a5088a1e06821f523790ac360736c4b224849fcae8ea123872e0ce5e28bd708ea50335140548242c93f96daa509b29bc9f69e3c0c82168771efe14264e570175de35a43", 0xf3}, {&(0x7f0000001140)="7e2a5b8b3255b319c725d8a226622de85913df090a42e4d331af1db638672b11f988b6e3c58eb44ad5a81c27dfff9f86e2b14179cf0f5e9a7192721604784faa5f4ea137f8445fc55c572f4e9a75429b82cc6bc2474d1458ddeae3b444263316d1a89805df96c411216c33688f0bb0dbc1f0e689993cbe53ff255ab4923abc436b70301199481690d3d8e17384144c1e27ac92121a11ff8ab18810d72f7856c5566d5a23893a11b13580d224da4c076e017592be6555042752918cf7f3ef87c8547c142925f03a2772f2d603e0a755c9b081db319130f009305ad1e2afcd2c", 0xdf}, {&(0x7f0000001240)="884fb10f64588cad95cd1ed202d90973f996e99b051716e6e52df9d975374f93ba5eb8980eb3efdfc1fb7b2df26bf12e9e3490dc2c6d12f684a0738ab6f5de243321271e5338de03cb7e6f670e2ae094a0cbb248cbb9e64e12f7aba873fda25962a04df80004b29375bb986c9cac03f674999f62001697f63475fb81c62d33e3f31ac04c37a74ce4004f886754ddeb7682d62167a5a75e9585765e245e793c1d3172610108899cf2f32b81e10b3ff00e2744d915f5c0e6f303f834bc24f782011fc82ada1eb32545bea545595862255096fba9504c89941eca07cb27702d", 0xde}, {&(0x7f0000001340)="4e8d3a2c6f8b01bd8ef88d986bf008ae1c17f3cb14824942fb0d3a11125be6407d17b221a61bead13ef035a52b412514845af6a92e6346ac25215ed8ca805ac83f8a89e732862d7866e9698a453e63fdeb88aaac4edd3f6863dce34ee78e6a386295034877905a3f804e012bda7d0d301803b2f65b222e371dbfc4ea51f41f2b7b71bbfb6683dcec4e042dbffa6e913ba5043268176196eeb960224b1ad75f82a6ef537cc73c70985ad829691f4113ecfd5ca41f69566a9a38b7b3794d66a25a4764d6b17b4f7abc6575fdaa412b7e960182bf9c791c0e09f8a3d08c6a8d9145208939db521715429e6d7657a7c4eec467163e33fc9e08f9", 0xf8}, {&(0x7f0000001440)="702a0bbd5676926e616ef6c7875a137b02321ea9a6918b4b8d2c94e5b54fc8b5d004db211a48642e849eed63bcc60f5a5939bfedf95b8e163cd22f2bc101b647fbfb989c489dbe6ba7deae356b867228cdda4012182e958fb139c412246b557131dfc2538d23dcc3d21e40b343480a32adff68699cca92860c", 0x79}], 0x5, &(0x7f0000001600)=[@ip_retopts={{0xe4, 0x0, 0x7, {[@ssrr={0x89, 0x2b, 0x92, [@empty, @dev={0xac, 0x14, 0x14, 0x1f}, @dev={0xac, 0x14, 0x14, 0xa}, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x37}, @loopback, @loopback, @dev, @multicast1]}, @lsrr={0x83, 0x1b, 0x9, [@local, @broadcast, @loopback, @multicast1, @multicast2, @broadcast]}, @cipso={0x86, 0x9, 0x3, [{0x1, 0x3, "06"}]}, @noop, @timestamp_addr={0x44, 0x34, 0xc4, 0x1, 0x6, [{@empty, 0x40}, {@multicast1, 0x9}, {@rand_addr=0x64010101, 0xffff}, {@remote, 0x6}, {@remote, 0x7}, {@multicast1, 0x2}]}, @timestamp_addr={0x44, 0x34, 0x7b, 0x1, 0x4, [{@rand_addr=0x64010102, 0xfff}, {@rand_addr=0x64010102, 0xffff0001}, {@remote, 0x7fffffff}, {@broadcast, 0x9}, {@loopback, 0x5}, {@multicast1, 0x3}]}, @lsrr={0x83, 0xb, 0x69, [@dev={0xac, 0x14, 0x14, 0x25}, @broadcast]}, @ssrr={0x89, 0xf, 0xb4, [@multicast2, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x11}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x97}}], 0x168}, 0x10) (async) sendmsg$kcm(r2, &(0x7f0000000840)={&(0x7f00000000c0)=@xdp={0x2c, 0xd, r3, 0x1}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000140)="bed903ff3e6101784e2d5e31d80f5b6dadc283f8261e360098a71ff166f2f7a165fa17b38ffe626b48678002ce3938afccf982d2597192c2b6b341d6ed2bcb1d16b6cdbceb1ed639e28b2ccc51aa6944f6e469817dcdcc86e2486e378513a694c5cefd0b019cfb44cf371ec767fda920c432e5dd0fed87fb0131085082460dc2b244107924a825176872ef2118e43277b1c5afcaddc1ab6b788da8bf5284c2f997b430015edefe33bdb66188514cd6bf1ab0dbf18b070750815f1bb3f3e594d925277757c2b1176ff2be3a9a31cdfecccc4ff76bd84d0800c245b4fd9b569ade9890c15df99d9dedeea51e4ee6a3ab981c", 0xf1}, {&(0x7f0000000240)="27689db8d42a7d62147453d9d487b8532b5c4f21c73f19a9da34ee275b9f13d26c33cc57bbc11ad49da4b6a7d5c669ba7658968867a3b1ce1930d9da19439bb5ed9ed094edf74a885c5a600dcf4560f762cd3cb90d2228a43e8a11257834f0a2ede585fa47df208dea69c68fe14ee2fea815e003ab4ffee5d885e31da30390aeb334c313ec443b0ea9072975a14f4faae68fc2f3302f17d1e231c06f799d654e066736ff42668d282f0b6004d3c31dafeea9316ab553a734c15d1b08de6dec5f989ba978e4", 0xc5}, {&(0x7f0000000340)="5be1fd07fc8411cfc361dd348a7fd64af9a55960f60cfac9df8714fc3427a92ba0519566f27649b0d8eba52f963f03fada038f02d3e01129559574910ef654a1c83e9cda3e1b6b3756d5820c92c07409730e004c2d32114ddb8f5197470e18599a5660646746b72a465ed1fe9a2a6164119f6812e5d6874878330f54d398e98131759cc18e05c666eda09af7ca647a9643cb1fdd46c99c863919f14ffc8ef49a7a117cd0fe7c342f04ef5ed427a511f89d46d773516446081cde1679abca4164d8cf274818bbb720ad169f0b7b6c460a48e2b7f6", 0xd4}, {&(0x7f0000000440)="a91b795178a6720504fdae4fd7254659516ddda1188a6e33dfd2994f57e93c459b", 0x21}, {&(0x7f0000000480)="14b3248a2d4867f2e0d7dc78eefc93e079af03a18fd20402c139e26221bc4a5cde6592cf599006680ca507861e7205", 0x2f}, {&(0x7f00000004c0)="2449c10fd3c8462ca140267283571dbd3ffe567e9cfd27b603e1700854c831476f7fa6ee9ffeb68a190cf73f5e26036bae7467ef07e72674a58ad4fff2ff445681a8492698222cb45fb28f784e5f93434e28fcbaac7d00a2a63481e51620fdf9f1e6d025dc0db860edcaedcf8a59", 0x6e}, {&(0x7f0000000540)="c68e0b97a5f365ff1dc7e3883bb88f1638cece6938d770124ea062d0471996417aae9d53edac3aba1ebd61b3667d1d5c995a94b1aa418cb471a4bf7daa8d02c6f4a264a8ef863bcf", 0x48}, {&(0x7f0000000ac0)="58325f9acf16438f0ed3c70b16e84737f3d7e8f8abfc1d48992831a5cb3bedb05dbedb63b10962b32b8496e4688b2b22bfa7ccbdeb114b96fb79a310888c48b17e3d8d0e7c64b28a5175e1a90b568d86a804e0e3fc4d78cc70d89c0a49512fd0a4ee0d706473c0b499a5dc94a3637a0bb1ccad0c6f44da", 0x77}, {&(0x7f0000000640)="fa3b9ce9cf591c92b08241f86e0d4968de326e6f6a5b13ee346cffac499abbfe15a3fe108a7b1d7ef6d2474802004aae50e1b4d0891759a72ef34e93af0ec1b74cd4cc2520c35196eb2f95513a9d0be4d326764cf857352082c7a76fd2252fcea01d273d94ff33cee144f7a68b4d0565d283c20397f070083a1506ddcad030723946521a5e45597575f17c5d386e84853650d756539d68a72fed8e6991550bdfd2433f45ed36", 0xa6}], 0x9, &(0x7f0000000b40)=[{0x68, 0x119, 0x101, "cbc6d66aa6a515e132da739c519c883841c2ca233904f5592e4ef1e9c63232a8c103f7e4ff13816160da289b28035cc46a27c18f4f16dc20121cc8c1d850e5ceea00b8a132fa92bc27a77a7db80d915f0dec2b7cb0adfe17"}, {0x58, 0x108, 0x80000001, "4285315879b14a4beb577a76046ff0956a485c83ffcfb6b5e25ec712306cf46137cb060879b744e8ae106e012cfcd703a7dee9d3261040e9e99ec896bdb80b68d0"}], 0xc0}, 0x800) r5 = gettid() (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000002e40)=@abs, 0x6e, 0x0, 0x0, &(0x7f00000015c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x40}, 0x0) (async) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) (async, rerun: 64) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB, @ANYRESHEX, @ANYBLOB="1c000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRESHEX, @ANYRES32, @ANYBLOB="00000473004a5c572cc9bf", @ANYRES32=0x0, @ANYRES32=r8, @ANYRES16, @ANYRES32, @ANYRES32, @ANYBLOB="0003d200010000000204000001040000010000002000003f000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES64=r6, @ANYRES32=0x0, @ANYRESDEC=r9], 0xe0, 0x20000001}, 0x0) (rerun: 64) write$cgroup_type(r6, &(0x7f0000002ec0), 0x9) (async) r10 = gettid() sendmsg$unix(r0, &(0x7f0000002e00)={&(0x7f00000017c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001840)="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", 0xfd}, {&(0x7f0000001940)="a891a0f934a286444c6ab0224565b326eb8fda3a7922a1b357b6a0d19515b629f92f6a6c7edcbf302098559b9ce37b7e9cd9f1fadb7191cfc97035fdba92497763317d52eda2cb83f62c36fa8d0f4cf2ec8bf285d19859d28bd01305d1245dd28476d4143e4fc36b076628de267cc8ad27ee9cde774daddcca4b218b7e188402c9e4f5854da0837d3da7797cabf6530b13aefd0b6566cdd184f91b48e88906c3945bbdd726d943721a8261760f7d67406952c2a7f064c456a55e7fc7210d1b3427023dc68904bda9f6172ec107d8b51415cdf4fdb791e2ac033b", 0xda}, {&(0x7f0000001a40)="9d4a242dff651f403b6ea2ca595519baacbee06bea329d119a05910c", 0x1c}], 0x3, &(0x7f0000001ac0)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xffffffffffffffff, r8}}}, @cred={{0x1c, 0x1, 0x2, {r10, 0xffffffffffffffff, 0xee01}}}], 0x58, 0x40}, 0x20040000) recvmsg$kcm(r2, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000880)=""/181, 0xb5}, {&(0x7f0000000940)=""/28, 0x1c}], 0x2, &(0x7f00000009c0)=""/183, 0xb7}, 0x10000) (async, rerun: 64) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f00000005c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'tgr128-generic\x00'}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000c00)="7db05f4108b841ed51cc4735b5a9360b3244f3c63f00aa93dd1b0050c24047b5ec50cdea2ea65a021ed42cb8e0b7a900f46291b41657117033a133b1114a93b74210b93a4c3424b93b4e6e8c143d952ba9db1c533b5d45e7ac3d5fe54439b41fb5b8e868c2f99512582dbf6869e66f2557430975a70425d9eb58fe183c46138b73da745aa62d8d2df4ff0d740812f426fbe0aba0a991536144da0608b73d308baa8d975fe34e7d6ef407b3de4fb11d80129ad84391120b8aaa6464c7e81b", 0xbe}, {&(0x7f0000000cc0)="8be675b0b98a51695dff810f5932d36154995a796ff4abe51be7bc4a415b42563f6250c0abe5c45e2abe9f4b31033b7f8af82c0ff2a874b5e79e618266f66ffc5be8deb4f78368c92e00772226dfdc8c5ff456e794064652245009384c99a7146c5afaa40ad0db051661526a2086a02a614149476615df875425040f345512a8234f201da7ac1c5006e573f6fe812980429fc2dee69844c6b5e45a616c095c011382c1691d8f1f5b488efc6e7c7b77ead9f2ec5e1c27e30442f3f19a12a8731c3c431df70964ff018680017400b13b4c032a8a36c640aaf5b6", 0xd9}, {&(0x7f00000007c0)="d6fdf5de9d13a63265b9fadbc2931499164a1cb6263d455efa2d071cd4e4519cf5cbd37c0ade2ade1a8781dfb74a1d54cb8aa0ef37e49b366dd5ed549414e3a69267050f9d8a6bf9400ef21d4a6faae0231f3acd46ddd54542", 0x59}, {&(0x7f0000000dc0)="a0909f63afb0ee9082249c2a50352ea60e614fabce514de9735f58ce4962cbc44c2dcf2ed7093ea39f8f614b48cbd14d5b9e084d20fbaa15159957d1", 0x3c}, {&(0x7f0000000e00)="c5d93c729354092469c11ff954b0372956718993a349112e33df68747e55a23affa0ea77539fbcffd9df83a87b20d3ea110eea990497783ba1f5dac2c213b06d3b5b99513db63267c7b7c32093b91e45b831fad4a944129cd5aef05a74087998a13537914c08b8f44b063e77bf5b807bf86342ec9bef02a6d1fbf14e04784d65373ba8d74d4e3600d49f8e003ef40d8634dc3d4e370c1a23178580852f03f472d9ddd086636856fe7b63918bc9c49a", 0xaf}, {&(0x7f0000000ec0)="091cf59bb863e6ba3d34fc4ca152cd235326e710aecac865a5c024c2b1eff9f07ee0508030c28868c6b5ae35dbdf920bd5496a522d2bd8d0e91011599bcb28c4cd3d2960ab6a933dfa08d140f3b1ed3417e94aa96251e977665903b76c0fda8378", 0x61}], 0x6, &(0x7f0000001b80)=[{0x100, 0x10c, 0x8, "11f5d20bfa99b90d891cbd1c6c01be6b68ff180d9e337b495ece366a3c8167260f621822e69d3e8ca8fbf07ecc92efb6839cae0471c3565dc908000b86a898a59ade360909fe56bbc025cf0e012125c99e87a92e90cd323836ebc81d5d58a04730ddbda458a44c04b953bc5a6c9497a8aec6371654c9c620d9c68ced1c66d811c828cdd760df7f375f5ba2788f9403f6f859df458614a3a202a6eec851096f9080c5bf62f3f3909701f961709ab6467d156038ec3d322d64f005ab04ba51cacdc3dd411bd51b54accd6793a4d036b6ba97dc292a14f5f21d62bd6b1f7de747ef603ca774cf9165ba081ea8f3"}, {0x80, 0x88, 0x0, "e33097c74dac9bfda9a8b06a22dc3754841f0bd3fd187f212bccfa72447eda4ce7a380e8748b66cecc82b796cf47e4a7721fe9ed3081b30752b481ae6b6642e14853a24152c1267d42b48fbf0f41597be8c01fe80255bcbed2ef172371d9531a2c899a289a4e64a35b24"}, {0xd0, 0x104, 0x2, "93443d3043b2551a77c13bd0e0edf994157e6e1c01d204471774cc86308dd79ce71fa63bac9043c3fd761c737c55e550b51780082da52c30eb2b4d3e09efa8401dad24d18567f3c3b15a52f5996192f24765e8e81b7eb9bd37863b743302037f06eaf8c8d8ffa9002c7928f03e6c324eedc2a8c4a8909868628c926bf36d81f44934e418b1345069599d0f88f44c754652a53fea3200354f84c709bb34ac963d88716e4ceca2982f4a735d68170d88d289ac4e5a01bdd7cfbc"}, {0x1010, 0x10d, 0x0, "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"}], 0x1260}, 0x20044010) (rerun: 64) 06:14:35 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r1 = perf_event_open(&(0x7f0000000e80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40286608, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80001, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg\x00', 0x1}) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xa, &(0x7f00000005c0)=@raw=[@btf_id={0x18, 0x5, 0x3, 0x0, 0x3}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe}, @map_val={0x18, 0x4, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x1}], &(0x7f00000001c0)='GPL\x00', 0xffff, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, 0x2b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x1, 0x4, 0x4, 0x7}, 0x10, 0x0, r6, 0x2, 0x0, &(0x7f0000000440)=[{0x3, 0x1, 0x5, 0x2}, {0x4, 0x3, 0xf, 0x9}], 0x10, 0x80000000}, 0x90) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={0xffffffffffffffff, r3}, 0xc) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="f17f2c3b9fa9920797df0d40cc4d57364a08e51c6d80e8e7555c1b9ee3ab5f4b151156938fded57beb670257e5efd4ef9d0591833f7891dc45959107b7ad3c8fbd57c039a94e973c8efff7edd2447125aa3c123c1c3e590b16ea3ce3434b4f669f0855cad902b512fdc830be5a45c6f13dfe71b542b283089ba6a4924033e7e9588bd00f71b0e687fbf046e186ecbd8e83f03194c618e843a1a705e9300bf0e7fdd2d995bf687a", 0xa7}], 0x1, &(0x7f0000000040)=[@rights={{0x18, 0x1, 0x1, [r2, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r1, 0xffffffffffffffff, r0, r0, r0, r0]}}], 0x40, 0x40040}, 0x44001) (async) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x0, 0x5a, 0x3, 0x0, 0x4, 0x40, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x7ff, 0xe513}, 0x2000, 0x2, 0x4, 0x8, 0xe5, 0x7ff, 0x3, 0x0, 0x1f}, 0x0, 0x10, r1, 0x0) (async) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) 06:14:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 410.995186][ T9948] validate_nla: 30 callbacks suppressed [ 410.995212][ T9948] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.time\x00', 0x0, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:35 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 411.073988][ T9952] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00070010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 411.183844][ T9966] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 411.210836][ T9966] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.time\x00', 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000009500000000000000420d5f1efe4351e51756a8c45ec022bf08c8a891cf83adf89266697871943e03b50e7d443e52fbf31b686b87d363b68dfb33eb72f3d390ac13a5dbc037e5c4b8a60ca79828b9b8ecaa4bfbd579bd873648578bbe11c66650a0066a3b32"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x0, 0x8c, 0x66, &(0x7f0000000000)="4afccbf993dc72d3a33ec321fce1bfd7e8336f80f3b6b5a9e39c0cbc1d188d3242b62f43f3176ec165c8a67228fb51bdd37f32cb4f27a40bb2bfbd2fe305d719132c2e800362f47fa064dbb9074d26b253c740331825aba1bc69d823389788149914e2281e7ed85e1052008fc0c86a3440a52a56e217bf43c7237ebf752967d5a48dac958350cd13090bcbb5", &(0x7f0000000280)=""/102, 0x9b7d, 0x0, 0x60, 0xb8, &(0x7f0000000380)="1723584b932fc619c3a7ff37f59824911d8ad86aa982c6926310bb0f5555fc8d6953e80d0bcf29de266a6a4b88b80e5b13a37a341fa4e3d4f9e082af53bbdf6581b46cb0d7fe7b03e5e9408e1569b5f23bd8f9903e53bea112508f982bdc7ac4", &(0x7f0000000400)="5237aed8d5e73d21bf352c1440d010df854a8651faaa76f8fb4163c99e668b90ea4e7abf3b0144815b7fc82bcd4b5f9a6e40ca3b620e76637608940e7de761a0ee56783040e45f3f1743f86bff3d874df3568c61f6de23de6839664ec7baadc3a65d0c63e1dae90d1e89a9a09e43f60446f53223dcdc36a1b2c305785c1478d36234f760fdd57ecadd4e2d1cd6a3eb18bcaff06646d8d8772bfd907a15b6e4a2e3e70058ad323aecac493331e5d5e3b361d151dd7d716151", 0x2, 0x0, 0x7fff}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 411.431397][ T9966] team0 (unregistering): Port device team_slave_0 removed [ 411.481813][ T9966] team0 (unregistering): Port device team_slave_1 removed 06:14:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000009500000000000000420d5f1efe4351e51756a8c45ec022bf08c8a891cf83adf89266697871943e03b50e7d443e52fbf31b686b87d363b68dfb33eb72f3d390ac13a5dbc037e5c4b8a60ca79828b9b8ecaa4bfbd579bd873648578bbe11c66650a0066a3b32"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x0, 0x8c, 0x66, &(0x7f0000000000)="4afccbf993dc72d3a33ec321fce1bfd7e8336f80f3b6b5a9e39c0cbc1d188d3242b62f43f3176ec165c8a67228fb51bdd37f32cb4f27a40bb2bfbd2fe305d719132c2e800362f47fa064dbb9074d26b253c740331825aba1bc69d823389788149914e2281e7ed85e1052008fc0c86a3440a52a56e217bf43c7237ebf752967d5a48dac958350cd13090bcbb5", &(0x7f0000000280)=""/102, 0x9b7d, 0x0, 0x60, 0xb8, &(0x7f0000000380)="1723584b932fc619c3a7ff37f59824911d8ad86aa982c6926310bb0f5555fc8d6953e80d0bcf29de266a6a4b88b80e5b13a37a341fa4e3d4f9e082af53bbdf6581b46cb0d7fe7b03e5e9408e1569b5f23bd8f9903e53bea112508f982bdc7ac4", &(0x7f0000000400)="5237aed8d5e73d21bf352c1440d010df854a8651faaa76f8fb4163c99e668b90ea4e7abf3b0144815b7fc82bcd4b5f9a6e40ca3b620e76637608940e7de761a0ee56783040e45f3f1743f86bff3d874df3568c61f6de23de6839664ec7baadc3a65d0c63e1dae90d1e89a9a09e43f60446f53223dcdc36a1b2c305785c1478d36234f760fdd57ecadd4e2d1cd6a3eb18bcaff06646d8d8772bfd907a15b6e4a2e3e70058ad323aecac493331e5d5e3b361d151dd7d716151", 0x2, 0x0, 0x7fff}, 0x50) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 411.595183][ T9972] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00080010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000012008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000880)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000980)='blkio.bfq.idle_time\x00', 0x0, 0x0) close(r3) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000800)={r3}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x6, 0x200, 0x4, 0x1007, 0x1, 0x7ff, '\x00', r5, r0, 0x0, 0x2, 0x2, 0x2}, 0x48) r6 = syz_clone(0x110000, &(0x7f00000000c0)="29e2cc21a1ae13585188405b515c493241ee32ebd8945ef9ba65", 0x1a, 0x0, 0x0, 0x0) perf_event_open(0x0, r6, 0xd, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r7, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x7a, 0x1e, 0x0, 0x2c, 0x0, 0x6, 0x8, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x3, @perf_bp={&(0x7f00000003c0), 0x8}, 0x81500, 0xb8e, 0xfffffffc, 0x0, 0x0, 0x6, 0x2, 0x0, 0x9, 0x0, 0x80000000000000}, r6, 0x6, r7, 0x9) perf_event_open(&(0x7f0000000900)={0x2, 0x80, 0xfe, 0x20, 0x81, 0x4, 0x0, 0xb70, 0x2281, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000008c0), 0x8}, 0x140, 0x7fff, 0xdc2e, 0x2, 0x1, 0xffff, 0x8001, 0x0, 0x101, 0x0, 0xd2}, r6, 0x9, r0, 0x3) r8 = syz_clone(0x40010900, &(0x7f00000005c0)="d698b2ef27ddaf7f3de7feff123c0594de7a3d021c913822c9cdbda48e46d4f42d6be08468b55ea19ba80e71a5e5eae1a85e101ef8dd1884511b0ab0e2219f17f2bdb3b2b8075d2e2390ef3e080cc644cd43bf52b4df94982bb0572f9631498bc9f78460ad7ef09e4fe5e397944b3db0a69e8dc41ea13907a31dfd35bc027705c64c98521b3f22886795fea36fd3e1942a17c5954369750cf03d94478f9441e4", 0xa0, &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)="8e563308e8e36da101a0dc88f48aeeaf9ca006188b3914bd6ff32058f54663903e53a688662f724de46b0156d53c0673eb26a98b861b4cc1d7f2debc75341573f3faa932ca") r9 = perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x54, 0x6, 0x8, 0xff, 0x0, 0x5, 0x40000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x9}, 0x28, 0xfffffffffffffffb, 0x0, 0x5, 0xb8, 0x9, 0x1, 0x0, 0x6, 0x0, 0x3}, r6, 0x1, r7, 0x1) perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x7, 0x2, 0x3, 0x2, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000500), 0x1}, 0x200, 0x8, 0x1, 0x3, 0x7, 0x2, 0x5, 0x0, 0x800, 0x0, 0x5}, r8, 0x10, r9, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfd, 0x8, 0x0, 0xf9, 0x0, 0xfffffffffffffdd2, 0x4a00, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_config_ext={0x7fff}, 0x401, 0x9, 0xe5bd, 0x3, 0x37a, 0x1, 0x2100, 0x0, 0x7c15864e}, r6, 0xe, r2, 0x0) 06:14:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000009500000000000000420d5f1efe4351e51756a8c45ec022bf08c8a891cf83adf89266697871943e03b50e7d443e52fbf31b686b87d363b68dfb33eb72f3d390ac13a5dbc037e5c4b8a60ca79828b9b8ecaa4bfbd579bd873648578bbe11c66650a0066a3b32"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x0, 0x8c, 0x66, &(0x7f0000000000)="4afccbf993dc72d3a33ec321fce1bfd7e8336f80f3b6b5a9e39c0cbc1d188d3242b62f43f3176ec165c8a67228fb51bdd37f32cb4f27a40bb2bfbd2fe305d719132c2e800362f47fa064dbb9074d26b253c740331825aba1bc69d823389788149914e2281e7ed85e1052008fc0c86a3440a52a56e217bf43c7237ebf752967d5a48dac958350cd13090bcbb5", &(0x7f0000000280)=""/102, 0x9b7d, 0x0, 0x60, 0xb8, &(0x7f0000000380)="1723584b932fc619c3a7ff37f59824911d8ad86aa982c6926310bb0f5555fc8d6953e80d0bcf29de266a6a4b88b80e5b13a37a341fa4e3d4f9e082af53bbdf6581b46cb0d7fe7b03e5e9408e1569b5f23bd8f9903e53bea112508f982bdc7ac4", &(0x7f0000000400)="5237aed8d5e73d21bf352c1440d010df854a8651faaa76f8fb4163c99e668b90ea4e7abf3b0144815b7fc82bcd4b5f9a6e40ca3b620e76637608940e7de761a0ee56783040e45f3f1743f86bff3d874df3568c61f6de23de6839664ec7baadc3a65d0c63e1dae90d1e89a9a09e43f60446f53223dcdc36a1b2c305785c1478d36234f760fdd57ecadd4e2d1cd6a3eb18bcaff06646d8d8772bfd907a15b6e4a2e3e70058ad323aecac493331e5d5e3b361d151dd7d716151", 0x2, 0x0, 0x7fff}, 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000f100850000000e0000009500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x1d, 0x8, 0x885d317, 0x40, 0x70, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={0x1, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000880)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="01740300ff030000"], &(0x7f0000000080)='GPL\x00', 0x9, 0xc6, &(0x7f0000000380)=""/198, 0x41000, 0x29, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x5, 0xc, 0xc48c, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000900)=[r2, r3, 0xffffffffffffffff, r4, r5], &(0x7f0000000940)=[{0x2, 0x2, 0x9, 0x8}], 0x10, 0xe08f}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) openat$cgroup_ro(r6, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00090010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 411.878717][ T9989] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 411.903885][ T9992] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8040, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x80534, 0x0, 0x2, 0x6, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r0, &(0x7f0000000580), 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x85) write$cgroup_int(r0, &(0x7f0000000200)=0x6, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x40, 0x0, 0xfb, 0x5, 0x0, 0x3f, 0x88c0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x6, 0x0, 0x6, 0x1, 0x3, 0x4, 0x3ff, 0x0, 0xe1, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0x10, r3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) [ 411.952355][ T9992] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:36 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) (async) r3 = socket$kcm(0x29, 0x2, 0x0) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000880)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000980)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async) close(r3) (async) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) (async) socket$kcm(0x29, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000800)={r3}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x6, 0x200, 0x4, 0x1007, 0x1, 0x7ff, '\x00', r5, r0, 0x0, 0x2, 0x2, 0x2}, 0x48) (async) r6 = syz_clone(0x110000, &(0x7f00000000c0)="29e2cc21a1ae13585188405b515c493241ee32ebd8945ef9ba65", 0x1a, 0x0, 0x0, 0x0) perf_event_open(0x0, r6, 0xd, 0xffffffffffffffff, 0x0) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r7, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) (async) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x7a, 0x1e, 0x0, 0x2c, 0x0, 0x6, 0x8, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x3, @perf_bp={&(0x7f00000003c0), 0x8}, 0x81500, 0xb8e, 0xfffffffc, 0x0, 0x0, 0x6, 0x2, 0x0, 0x9, 0x0, 0x80000000000000}, r6, 0x6, r7, 0x9) (async) perf_event_open(&(0x7f0000000900)={0x2, 0x80, 0xfe, 0x20, 0x81, 0x4, 0x0, 0xb70, 0x2281, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000008c0), 0x8}, 0x140, 0x7fff, 0xdc2e, 0x2, 0x1, 0xffff, 0x8001, 0x0, 0x101, 0x0, 0xd2}, r6, 0x9, r0, 0x3) (async) r8 = syz_clone(0x40010900, &(0x7f00000005c0)="d698b2ef27ddaf7f3de7feff123c0594de7a3d021c913822c9cdbda48e46d4f42d6be08468b55ea19ba80e71a5e5eae1a85e101ef8dd1884511b0ab0e2219f17f2bdb3b2b8075d2e2390ef3e080cc644cd43bf52b4df94982bb0572f9631498bc9f78460ad7ef09e4fe5e397944b3db0a69e8dc41ea13907a31dfd35bc027705c64c98521b3f22886795fea36fd3e1942a17c5954369750cf03d94478f9441e4", 0xa0, &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)="8e563308e8e36da101a0dc88f48aeeaf9ca006188b3914bd6ff32058f54663903e53a688662f724de46b0156d53c0673eb26a98b861b4cc1d7f2debc75341573f3faa932ca") (async) r9 = perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x54, 0x6, 0x8, 0xff, 0x0, 0x5, 0x40000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x9}, 0x28, 0xfffffffffffffffb, 0x0, 0x5, 0xb8, 0x9, 0x1, 0x0, 0x6, 0x0, 0x3}, r6, 0x1, r7, 0x1) perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x7, 0x2, 0x3, 0x2, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000500), 0x1}, 0x200, 0x8, 0x1, 0x3, 0x7, 0x2, 0x5, 0x0, 0x800, 0x0, 0x5}, r8, 0x10, r9, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfd, 0x8, 0x0, 0xf9, 0x0, 0xfffffffffffffdd2, 0x4a00, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_config_ext={0x7fff}, 0x401, 0x9, 0xe5bd, 0x3, 0x37a, 0x1, 0x2100, 0x0, 0x7c15864e}, r6, 0xe, r2, 0x0) [ 412.057349][ T9996] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:36 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.numa_stat\x00', 0x0, 0x0) r3 = socket$kcm(0x29, 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000840)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000880)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000980)='blkio.bfq.idle_time\x00', 0x0, 0x0) close(r3) (async) close(r3) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xe0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000800)={r3}) (async) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000800)={r3}) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@bloom_filter={0x1e, 0x6, 0x200, 0x4, 0x1007, 0x1, 0x7ff, '\x00', r5, r0, 0x0, 0x2, 0x2, 0x2}, 0x48) r6 = syz_clone(0x110000, &(0x7f00000000c0)="29e2cc21a1ae13585188405b515c493241ee32ebd8945ef9ba65", 0x1a, 0x0, 0x0, 0x0) perf_event_open(0x0, r6, 0xd, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r7, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001740)={r7, 0xe0, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f0000001480)=[0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001680), &(0x7f00000016c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001700)}}, 0x10) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x7a, 0x1e, 0x0, 0x2c, 0x0, 0x6, 0x8, 0xa, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x3, @perf_bp={&(0x7f00000003c0), 0x8}, 0x81500, 0xb8e, 0xfffffffc, 0x0, 0x0, 0x6, 0x2, 0x0, 0x9, 0x0, 0x80000000000000}, r6, 0x6, r7, 0x9) perf_event_open(&(0x7f0000000900)={0x2, 0x80, 0xfe, 0x20, 0x81, 0x4, 0x0, 0xb70, 0x2281, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f00000008c0), 0x8}, 0x140, 0x7fff, 0xdc2e, 0x2, 0x1, 0xffff, 0x8001, 0x0, 0x101, 0x0, 0xd2}, r6, 0x9, r0, 0x3) r8 = syz_clone(0x40010900, &(0x7f00000005c0)="d698b2ef27ddaf7f3de7feff123c0594de7a3d021c913822c9cdbda48e46d4f42d6be08468b55ea19ba80e71a5e5eae1a85e101ef8dd1884511b0ab0e2219f17f2bdb3b2b8075d2e2390ef3e080cc644cd43bf52b4df94982bb0572f9631498bc9f78460ad7ef09e4fe5e397944b3db0a69e8dc41ea13907a31dfd35bc027705c64c98521b3f22886795fea36fd3e1942a17c5954369750cf03d94478f9441e4", 0xa0, &(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)="8e563308e8e36da101a0dc88f48aeeaf9ca006188b3914bd6ff32058f54663903e53a688662f724de46b0156d53c0673eb26a98b861b4cc1d7f2debc75341573f3faa932ca") r9 = perf_event_open(&(0x7f0000000780)={0x3, 0x80, 0x54, 0x6, 0x8, 0xff, 0x0, 0x5, 0x40000, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x9}, 0x28, 0xfffffffffffffffb, 0x0, 0x5, 0xb8, 0x9, 0x1, 0x0, 0x6, 0x0, 0x3}, r6, 0x1, r7, 0x1) perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x7, 0x2, 0x3, 0x2, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000500), 0x1}, 0x200, 0x8, 0x1, 0x3, 0x7, 0x2, 0x5, 0x0, 0x800, 0x0, 0x5}, r8, 0x10, r9, 0x0) (async) perf_event_open(&(0x7f0000000540)={0x4, 0x80, 0x7, 0x2, 0x3, 0x2, 0x0, 0x0, 0x4800, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000500), 0x1}, 0x200, 0x8, 0x1, 0x3, 0x7, 0x2, 0x5, 0x0, 0x800, 0x0, 0x5}, r8, 0x10, r9, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfd, 0x8, 0x0, 0xf9, 0x0, 0xfffffffffffffdd2, 0x4a00, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_config_ext={0x7fff}, 0x401, 0x9, 0xe5bd, 0x3, 0x37a, 0x1, 0x2100, 0x0, 0x7c15864e}, r6, 0xe, r2, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0xfd, 0x8, 0x0, 0xf9, 0x0, 0xfffffffffffffdd2, 0x4a00, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1, @perf_config_ext={0x7fff}, 0x401, 0x9, 0xe5bd, 0x3, 0x37a, 0x1, 0x2100, 0x0, 0x7c15864e}, r6, 0xe, r2, 0x0) 06:14:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000002f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000a0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:36 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000f100850000000e0000009500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x1d, 0x8, 0x885d317, 0x40, 0x70, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={0x1, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) (async, rerun: 32) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000880)='./file0\x00', 0x0, 0x4000, r0}, 0x18) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="01740300ff030000"], &(0x7f0000000080)='GPL\x00', 0x9, 0xc6, &(0x7f0000000380)=""/198, 0x41000, 0x29, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x5, 0xc, 0xc48c, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000900)=[r2, r3, 0xffffffffffffffff, r4, r5], &(0x7f0000000940)=[{0x2, 0x2, 0x9, 0x8}], 0x10, 0xe08f}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) openat$cgroup_ro(r6, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000007b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 412.362126][T10015] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000f100850000000e0000009500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x1d, 0x8, 0x885d317, 0x40, 0x70, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={0x1, 0xffffffffffffffff}, 0x4) (async) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000880)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="01740300ff030000"], &(0x7f0000000080)='GPL\x00', 0x9, 0xc6, &(0x7f0000000380)=""/198, 0x41000, 0x29, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x5, 0xc, 0xc48c, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000900)=[r2, r3, 0xffffffffffffffff, r4, r5], &(0x7f0000000940)=[{0x2, 0x2, 0x9, 0x8}], 0x10, 0xe08f}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) openat$cgroup_ro(r6, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:36 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8040, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x80534, 0x0, 0x2, 0x6, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r0, &(0x7f0000000580), 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x85) write$cgroup_int(r0, &(0x7f0000000200)=0x6, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x40, 0x0, 0xfb, 0x5, 0x0, 0x3f, 0x88c0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x6, 0x0, 0x6, 0x1, 0x3, 0x4, 0x3ff, 0x0, 0xe1, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0x10, r3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) (async) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8040, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x80534, 0x0, 0x2, 0x6, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) (async) write$cgroup_int(r0, &(0x7f0000000580), 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) (async) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x85) (async) write$cgroup_int(r0, &(0x7f0000000200)=0x6, 0x12) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x40, 0x0, 0xfb, 0x5, 0x0, 0x3f, 0x88c0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x6, 0x0, 0x6, 0x1, 0x3, 0x4, 0x3ff, 0x0, 0xe1, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0x10, r3, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) (async) 06:14:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:36 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000f100850000000e0000009500000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r0, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000300), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x1d, 0x8, 0x885d317, 0x40, 0x70, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000007c0)={0x1, 0xffffffffffffffff}, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3}, 0x48) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000880)='./file0\x00', 0x0, 0x4000, r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="01740300ff030000"], &(0x7f0000000080)='GPL\x00', 0x9, 0xc6, &(0x7f0000000380)=""/198, 0x41000, 0x29, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000700)={0x5, 0xc, 0xc48c, 0x2}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000900)=[r2, r3, 0xffffffffffffffff, r4, r5], &(0x7f0000000940)=[{0x2, 0x2, 0x9, 0x8}], 0x10, 0xe08f}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) openat$cgroup_ro(r6, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00020010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000e0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000012008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00030010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00100010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 413.077440][T10041] team0: left allmulticast mode [ 413.108345][T10041] team_slave_0: left allmulticast mode [ 413.155090][T10041] team_slave_1: left allmulticast mode [ 413.184409][T10041] bridge0: port 3(team0) entered disabled state 06:14:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00040010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00140010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:37 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8040, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x80534, 0x0, 0x2, 0x6, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8040, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext, 0x80534, 0x0, 0x2, 0x6, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r0, &(0x7f0000000580), 0x12) (async) write$cgroup_int(r0, &(0x7f0000000580), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x85) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x85) write$cgroup_int(r0, &(0x7f0000000200)=0x6, 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000780)={0x5, 0x80, 0x40, 0x0, 0xfb, 0x5, 0x0, 0x3f, 0x88c0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x6, 0x0, 0x6, 0x1, 0x3, 0x4, 0x3ff, 0x0, 0xe1, 0x0, 0x7fffffffffffffff}, 0xffffffffffffffff, 0x10, r3, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 06:14:37 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(r2, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) 06:14:37 executing program 3: bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a40), 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180300000000b2ff0000000000000000850000000700000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x0, 0x0, 0xf452, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0xe, 0x0, 0x0, 0x94c, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x1002000}, 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r3}, 0x80) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9086, 0x93263777466ef9ae, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x0, 0x1ff, 0x0, 0x100, 0x3, 0x6, 0x0, 0x3e}, 0x0, 0xc, r1, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x3e, 0x30, 0x5f]}}, &(0x7f0000000700)=""/122, 0x29, 0x7a, 0x1, 0x9}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x11, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000700000000000000ff00000018120000", @ANYRES32=r4, @ANYBLOB="00e65d2ad247ec311903000000000000850000000c000000b70000000000ff0018110000", @ANYRES32, @ANYBLOB="000000000000212874cf0493e617722abb06cf23380000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0x92, &(0x7f0000000540)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x9, 0x83df, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000880)=[r4, r1], &(0x7f00000008c0)=[{0x0, 0x2, 0xe, 0x6}, {0x5, 0x3, 0xd, 0x8c5b39a5ac1e76d1}, {0x1, 0x5, 0x7, 0x5}, {0x3, 0x2, 0x2, 0xa}, {0x2, 0x3, 0xc, 0x2}], 0x10, 0x6}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x29, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0xffffffff80000000}, 0x100, 0x3, 0x5, 0x7, 0x3, 0x0, 0xfff7, 0x0, 0xfff}, 0x0, 0x4000000002, 0xffffffffffffffff, 0x596c142741881344) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x3010, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x401}, 0x0, 0x800002, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x4, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000fc0)=0x82c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000c40)=0x700000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x9) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r7}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x2) 06:14:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e003c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:37 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00050010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 06:14:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}, @generic={0x2, 0x2, 0x4, 0x8000, 0x9}, @generic={0x80, 0x4, 0x0, 0xff80}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0x0, 0x81, &(0x7f0000000280)=""/129, 0x40f00, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x3, 0x62, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, r1, r1], 0x0, 0x10, 0x7f}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00060010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00480010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00070010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}, @generic={0x2, 0x2, 0x4, 0x8000, 0x9}, @generic={0x80, 0x4, 0x0, 0xff80}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0x0, 0x81, &(0x7f0000000280)=""/129, 0x40f00, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x3, 0x62, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, r1, r1], 0x0, 0x10, 0x7f}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e004c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 3: bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a40), 0x2) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180300000000b2ff0000000000000000850000000700000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x0, 0x0, 0xf452, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0xe, 0x0, 0x0, 0x94c, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x1002000}, 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r3}, 0x80) (async) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9086, 0x93263777466ef9ae, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x0, 0x1ff, 0x0, 0x100, 0x3, 0x6, 0x0, 0x3e}, 0x0, 0xc, r1, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x3e, 0x30, 0x5f]}}, &(0x7f0000000700)=""/122, 0x29, 0x7a, 0x1, 0x9}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x11, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000700000000000000ff00000018120000", @ANYRES32=r4, @ANYBLOB="00e65d2ad247ec311903000000000000850000000c000000b70000000000ff0018110000", @ANYRES32, @ANYBLOB="000000000000212874cf0493e617722abb06cf23380000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0x92, &(0x7f0000000540)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x9, 0x83df, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000880)=[r4, r1], &(0x7f00000008c0)=[{0x0, 0x2, 0xe, 0x6}, {0x5, 0x3, 0xd, 0x8c5b39a5ac1e76d1}, {0x1, 0x5, 0x7, 0x5}, {0x3, 0x2, 0x2, 0xa}, {0x2, 0x3, 0xc, 0x2}], 0x10, 0x6}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x29, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0xffffffff80000000}, 0x100, 0x3, 0x5, 0x7, 0x3, 0x0, 0xfff7, 0x0, 0xfff}, 0x0, 0x4000000002, 0xffffffffffffffff, 0x596c142741881344) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x3010, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x401}, 0x0, 0x800002, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x4, 0xffffffffffffffff, 0x2) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000fc0)=0x82c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000c40)=0x700000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x9) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r7}, 0x8) (async) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x2) 06:14:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00080010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}, @generic={0x2, 0x2, 0x4, 0x8000, 0x9}, @generic={0x80, 0x4, 0x0, 0xff80}, @map_fd={0x18, 0x1, 0x1, 0x0, r1}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000140)='GPL\x00', 0x0, 0x81, &(0x7f0000000280)=""/129, 0x40f00, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x5, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x3, 0x62, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, r1, r1], 0x0, 0x10, 0x7f}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00600010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 3: bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000a40), 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180300000000b2ff0000000000000000850000000700000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) (async) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340)}, 0x0, 0x0, 0x0, 0x0, 0xf452, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x20, &(0x7f00000006c0)={&(0x7f0000000640)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1b, 0xe, 0x0, 0x0, 0x94c, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000940)={0x1002000}, 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2, r3}, 0x80) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9086, 0x93263777466ef9ae, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x0, 0x0, 0x1ff, 0x0, 0x100, 0x3, 0x6, 0x0, 0x3e}, 0x0, 0xc, r1, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x3e, 0x30, 0x5f]}}, &(0x7f0000000700)=""/122, 0x29, 0x7a, 0x1, 0x9}, 0x20) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x3e, 0x30, 0x5f]}}, &(0x7f0000000700)=""/122, 0x29, 0x7a, 0x1, 0x9}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x11, &(0x7f0000000b80)=ANY=[@ANYBLOB="180000000700000000000000ff00000018120000", @ANYRES32=r4, @ANYBLOB="00e65d2ad247ec311903000000000000850000000c000000b70000000000ff0018110000", @ANYRES32, @ANYBLOB="000000000000212874cf0493e617722abb06cf23380000b7080000030000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0x92, &(0x7f0000000540)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000000800)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000840)={0x2, 0x9, 0x83df, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000880)=[r4, r1], &(0x7f00000008c0)=[{0x0, 0x2, 0xe, 0x6}, {0x5, 0x3, 0xd, 0x8c5b39a5ac1e76d1}, {0x1, 0x5, 0x7, 0x5}, {0x3, 0x2, 0x2, 0xa}, {0x2, 0x3, 0xc, 0x2}], 0x10, 0x6}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x29, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0xffffffff80000000}, 0x100, 0x3, 0x5, 0x7, 0x3, 0x0, 0xfff7, 0x0, 0xfff}, 0x0, 0x4000000002, 0xffffffffffffffff, 0x596c142741881344) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x3010, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0x401}, 0x0, 0x800002, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0x4, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000fc0)=0x82c) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000fc0)=0x82c) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000c40)=0x700000000) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x9) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) (async) r7 = bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000a80)={r7}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x2) 06:14:38 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00090010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00680010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x7a05, 0x1700) 06:14:38 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000a0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x7a05, 0x1700) 06:14:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e006c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:39 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) (async) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 06:14:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.current\x00', 0x7a05, 0x1700) (async) 06:14:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00740010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000e0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:39 executing program 5: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) (async) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) (async) 06:14:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00100010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:39 executing program 3: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000980)=ANY=[], 0x7) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 06:14:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e007a0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:40 executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x72c, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func, @map_fd={0x18, 0xb}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa1b8c03a0e3734ed}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2b, 'blkio'}, {0x2d, 'hugetlb'}, {0x2d, 'net_cls'}, {0x2b, 'devices'}, {0x2b, 'perf_event'}, {0x0, 'cpuacct'}, {0x2d, 'blkio'}, {0x6, 'blkio'}]}, 0x45) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00480010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:40 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e003c0110008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:40 executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x72c, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func, @map_fd={0x18, 0xb}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa1b8c03a0e3734ed}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2b, 'blkio'}, {0x2d, 'hugetlb'}, {0x2d, 'net_cls'}, {0x2b, 'devices'}, {0x2b, 'perf_event'}, {0x0, 'cpuacct'}, {0x2d, 'blkio'}, {0x6, 'blkio'}]}, 0x45) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e004c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 416.009064][T10160] validate_nla: 28 callbacks suppressed [ 416.009089][T10160] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:40 executing program 0: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000280)={0x1b, 0x0, 0x0, 0x8, 0x0, 0x1, 0x72c, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x14, &(0x7f0000000300)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func, @map_fd={0x18, 0xb}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa1b8c03a0e3734ed}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x2b, 'blkio'}, {0x2d, 'hugetlb'}, {0x2d, 'net_cls'}, {0x2b, 'devices'}, {0x2b, 'perf_event'}, {0x0, 'cpuacct'}, {0x2d, 'blkio'}, {0x6, 'blkio'}]}, 0x45) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 416.084811][T10164] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00be0110008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00600010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 416.481901][T10172] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18001200002ec8ef173f6726e500e29638141e2269be825377a700100000000000850000000e0000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x8, 0x7, 0x9, 0x98, 0xffffffffffffffff, 0xcd, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f0000000280)}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r3 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x100000001}, 0x0, 0xea5c, 0x0, 0x5, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) r5 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000c00), 0x6e, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRES16=r4, @ANYRESDEC=r3], 0x150}, 0x1) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000cc0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000d80)=""/231, 0xe7}], 0x1, &(0x7f0000001840)=ANY=[@ANYBLOB="86a8d31b3324fe591fbd1b3a990300394970e4174d27609ceca65145451b460410b61985e927d84ab0d1b8020ed0972c0000000000000000", @ANYRES32, @ANYBLOB="46f5bcefff267c7aaaaac0c585e5a67938de65ebfe833e96a9c793467f4ef7ed7d19b489ec6e5d6890b9bca57f9479e416b9d7a0e3954e24a55434b014080c0c3ed0172f352572fb90dd12fe7a487fe9809626ecaa1a0ae687290714d86229548efa7b6b0f738161f70cab4b62880d48b71ede100ab8902be504cc18da798695f4c5805318040b96827279013d8e7dac22996bddcbac9b181e03ceea32698f04b2fc27a224dfa36a3be72597f35a9bd240f67453d14e57", @ANYRES32, @ANYRESDEC=r6, @ANYBLOB="1c0000000000000001000000020000008d124400dd0e49e9013c652435147fe8ac5b2a7cfde66935f69ea6958e845542f0d1d0fd619855c793cc2a3c0d3cbdc9be2acc6cf0382470f65aaae1c5221cc12c556958cd3da1e7a98a2e8a7923b52b51975db6a6caca41faa8057b18ebe21d0cb65d558d4ecc9760b3fc4305c86e1fd8c61e9ef8d568fb358fcf8d07182a66272a831f1be5beaecb49021b", @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32=r7, @ANYRESHEX=r3, @ANYRES32, @ANYRESHEX=r3, @ANYRES32, @ANYRES16=r7, @ANYRES32, @ANYRES16=r6, @ANYBLOB, @ANYBLOB="f2d9a58a27cb00720b8032443da47b", @ANYRESHEX=r3, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64, @ANYBLOB="64182a03"], 0xf8}, 0x40000040) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000008c0)={0x0, 0x80, 0x2, 0x6d, 0x0, 0x1, 0x0, 0x9, 0x42765, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000003c0)}, 0x440, 0x6, 0x5, 0x5, 0x4, 0x2, 0x5b74, 0x0, 0xdc3f, 0x0, 0x10001}, r8, 0x8, r3, 0xb) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@func={0xe, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x61, 0x2e, 0x5f, 0x2e, 0x0]}}, &(0x7f0000000500)=""/143, 0x2b, 0x8f, 0x1, 0x8001}, 0x20) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f0000000040)=0x2) openat$cgroup_ro(r10, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x1c, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x77b, 0x7c, &(0x7f0000000480)=""/124, 0x41000, 0x46, '\x00', 0x0, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0x4, 0x9e42, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r2, r10, r1], 0x0, 0x10, 0x8}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00720210008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 416.610841][T10174] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00680010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 416.828685][T10178] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 416.879155][T10181] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00d20210008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x200}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'erspan0\x00', 0x600}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x9}]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 06:14:41 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e006c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:41 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0x0, 0x0, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18001200002ec8ef173f6726e500e29638141e2269be825377a700100000000000850000000e0000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x8, 0x7, 0x9, 0x98, 0xffffffffffffffff, 0xcd, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f0000000280)}, 0x10) (async) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r3 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x100000001}, 0x0, 0xea5c, 0x0, 0x5, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) r5 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x9) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000c00), 0x6e, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRES16=r4, @ANYRESDEC=r3], 0x150}, 0x1) (async, rerun: 64) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000cc0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000d80)=""/231, 0xe7}], 0x1, &(0x7f0000001840)=ANY=[@ANYBLOB="86a8d31b3324fe591fbd1b3a990300394970e4174d27609ceca65145451b460410b61985e927d84ab0d1b8020ed0972c0000000000000000", @ANYRES32, @ANYBLOB="46f5bcefff267c7aaaaac0c585e5a67938de65ebfe833e96a9c793467f4ef7ed7d19b489ec6e5d6890b9bca57f9479e416b9d7a0e3954e24a55434b014080c0c3ed0172f352572fb90dd12fe7a487fe9809626ecaa1a0ae687290714d86229548efa7b6b0f738161f70cab4b62880d48b71ede100ab8902be504cc18da798695f4c5805318040b96827279013d8e7dac22996bddcbac9b181e03ceea32698f04b2fc27a224dfa36a3be72597f35a9bd240f67453d14e57", @ANYRES32, @ANYRESDEC=r6, @ANYBLOB="1c0000000000000001000000020000008d124400dd0e49e9013c652435147fe8ac5b2a7cfde66935f69ea6958e845542f0d1d0fd619855c793cc2a3c0d3cbdc9be2acc6cf0382470f65aaae1c5221cc12c556958cd3da1e7a98a2e8a7923b52b51975db6a6caca41faa8057b18ebe21d0cb65d558d4ecc9760b3fc4305c86e1fd8c61e9ef8d568fb358fcf8d07182a66272a831f1be5beaecb49021b", @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32=r7, @ANYRESHEX=r3, @ANYRES32, @ANYRESHEX=r3, @ANYRES32, @ANYRES16=r7, @ANYRES32, @ANYRES16=r6, @ANYBLOB, @ANYBLOB="f2d9a58a27cb00720b8032443da47b", @ANYRESHEX=r3, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64, @ANYBLOB="64182a03"], 0xf8}, 0x40000040) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000008c0)={0x0, 0x80, 0x2, 0x6d, 0x0, 0x1, 0x0, 0x9, 0x42765, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000003c0)}, 0x440, 0x6, 0x5, 0x5, 0x4, 0x2, 0x5b74, 0x0, 0xdc3f, 0x0, 0x10001}, r8, 0x8, r3, 0xb) (async) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@func={0xe, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x61, 0x2e, 0x5f, 0x2e, 0x0]}}, &(0x7f0000000500)=""/143, 0x2b, 0x8f, 0x1, 0x8001}, 0x20) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f0000000040)=0x2) openat$cgroup_ro(r10, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x1c, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x77b, 0x7c, &(0x7f0000000480)=""/124, 0x41000, 0x46, '\x00', 0x0, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0x4, 0x9e42, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r2, r10, r1], 0x0, 0x10, 0x8}, 0x90) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 416.932474][T10180] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 417.700982][T10191] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000310008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 417.792067][T10195] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 417.793155][T10192] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:42 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00740010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x200}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'erspan0\x00', 0x600}) (async, rerun: 32) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x9}]}) (async, rerun: 32) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) (async, rerun: 64) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (rerun: 64) [ 418.610897][T10202] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:43 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) 06:14:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e007a0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18001200002ec8ef173f6726e500e29638141e2269be825377a700100000000000850000000e0000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000740)=ANY=[@ANYBLOB="18001200002ec8ef173f6726e500e29638141e2269be825377a700100000000000850000000e0000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x8, 0x7, 0x9, 0x98, 0xffffffffffffffff, 0xcd, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x4}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f0000000280)}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r3 = perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x100000001}, 0x0, 0xea5c, 0x0, 0x5, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) r5 = perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x9) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000c00), 0x6e, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRES16=r4, @ANYRESDEC=r3], 0x150}, 0x1) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000c00), 0x6e, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRES16=r4, @ANYRESDEC=r3], 0x150}, 0x1) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000cc0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000d80)=""/231, 0xe7}], 0x1, &(0x7f0000001840)=ANY=[@ANYBLOB="86a8d31b3324fe591fbd1b3a990300394970e4174d27609ceca65145451b460410b61985e927d84ab0d1b8020ed0972c0000000000000000", @ANYRES32, @ANYBLOB="46f5bcefff267c7aaaaac0c585e5a67938de65ebfe833e96a9c793467f4ef7ed7d19b489ec6e5d6890b9bca57f9479e416b9d7a0e3954e24a55434b014080c0c3ed0172f352572fb90dd12fe7a487fe9809626ecaa1a0ae687290714d86229548efa7b6b0f738161f70cab4b62880d48b71ede100ab8902be504cc18da798695f4c5805318040b96827279013d8e7dac22996bddcbac9b181e03ceea32698f04b2fc27a224dfa36a3be72597f35a9bd240f67453d14e57", @ANYRES32, @ANYRESDEC=r6, @ANYBLOB="1c0000000000000001000000020000008d124400dd0e49e9013c652435147fe8ac5b2a7cfde66935f69ea6958e845542f0d1d0fd619855c793cc2a3c0d3cbdc9be2acc6cf0382470f65aaae1c5221cc12c556958cd3da1e7a98a2e8a7923b52b51975db6a6caca41faa8057b18ebe21d0cb65d558d4ecc9760b3fc4305c86e1fd8c61e9ef8d568fb358fcf8d07182a66272a831f1be5beaecb49021b", @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32=r7, @ANYRESHEX=r3, @ANYRES32, @ANYRESHEX=r3, @ANYRES32, @ANYRES16=r7, @ANYRES32, @ANYRES16=r6, @ANYBLOB, @ANYBLOB="f2d9a58a27cb00720b8032443da47b", @ANYRESHEX=r3, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64, @ANYBLOB="64182a03"], 0xf8}, 0x40000040) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000cc0), 0x6e, &(0x7f0000000480)=[{&(0x7f0000000d80)=""/231, 0xe7}], 0x1, &(0x7f0000001840)=ANY=[@ANYBLOB="86a8d31b3324fe591fbd1b3a990300394970e4174d27609ceca65145451b460410b61985e927d84ab0d1b8020ed0972c0000000000000000", @ANYRES32, @ANYBLOB="46f5bcefff267c7aaaaac0c585e5a67938de65ebfe833e96a9c793467f4ef7ed7d19b489ec6e5d6890b9bca57f9479e416b9d7a0e3954e24a55434b014080c0c3ed0172f352572fb90dd12fe7a487fe9809626ecaa1a0ae687290714d86229548efa7b6b0f738161f70cab4b62880d48b71ede100ab8902be504cc18da798695f4c5805318040b96827279013d8e7dac22996bddcbac9b181e03ceea32698f04b2fc27a224dfa36a3be72597f35a9bd240f67453d14e57", @ANYRES32, @ANYRESDEC=r6, @ANYBLOB="1c0000000000000001000000020000008d124400dd0e49e9013c652435147fe8ac5b2a7cfde66935f69ea6958e845542f0d1d0fd619855c793cc2a3c0d3cbdc9be2acc6cf0382470f65aaae1c5221cc12c556958cd3da1e7a98a2e8a7923b52b51975db6a6caca41faa8057b18ebe21d0cb65d558d4ecc9760b3fc4305c86e1fd8c61e9ef8d568fb358fcf8d07182a66272a831f1be5beaecb49021b", @ANYRES32=0x0, @ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESDEC, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32=r7, @ANYRESHEX=r3, @ANYRES32, @ANYRESHEX=r3, @ANYRES32, @ANYRES16=r7, @ANYRES32, @ANYRES16=r6, @ANYBLOB, @ANYBLOB="f2d9a58a27cb00720b8032443da47b", @ANYRESHEX=r3, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64, @ANYBLOB="64182a03"], 0xf8}, 0x40000040) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000008c0)={0x0, 0x80, 0x2, 0x6d, 0x0, 0x1, 0x0, 0x9, 0x42765, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000003c0)}, 0x440, 0x6, 0x5, 0x5, 0x4, 0x2, 0x5b74, 0x0, 0xdc3f, 0x0, 0x10001}, r8, 0x8, r3, 0xb) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@func={0xe, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x61, 0x2e, 0x5f, 0x2e, 0x0]}}, &(0x7f0000000500)=""/143, 0x2b, 0x8f, 0x1, 0x8001}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f0000000040)=0x2) (async) ioctl$PERF_EVENT_IOC_PERIOD(r10, 0x4004662b, &(0x7f0000000040)=0x2) openat$cgroup_ro(r10, &(0x7f0000000080)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x1c, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='GPL\x00', 0x77b, 0x7c, &(0x7f0000000480)=""/124, 0x41000, 0x46, '\x00', 0x0, 0x25, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600)={0x0, 0x4, 0x9e42, 0x8000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000640)=[r2, r10, r1], 0x0, 0x10, 0x8}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 418.864366][T10209] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000310008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00a40310008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:43 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$kcm(0xa, 0x2, 0x0) (async) 06:14:43 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x0, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 419.113780][T10217] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow 06:14:43 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'pimreg\x00', 0x200}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async, rerun: 32) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000180)={'erspan0\x00', 0x600}) (async, rerun: 32) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000280)={0x1, &(0x7f0000000240)=[{0x9}]}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 06:14:43 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x25, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x1}, [@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xd}, @jmp={0x5, 0x1, 0x6, 0x1, 0x0, 0x100, 0x1}, @ldst={0x1, 0x3, 0x3, 0x6, 0xa, 0xfffffffffffffff0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8738}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000040)='syzkaller\x00', 0xb6, 0xde, &(0x7f00000004c0)=""/222, 0x41000, 0x1, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0x5, 0x1ff, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000280)=[{0x0, 0x5, 0x3, 0x9}, {0x2, 0x4, 0x3, 0x4}, {0x5, 0x3, 0xc, 0x1}, {0x3, 0x5, 0xb, 0x8}, {0x0, 0x1, 0x7, 0x2}, {0x5, 0x2, 0x5, 0x7}, {0x0, 0x4, 0x2, 0x1}], 0x10, 0xfffffff7}, 0x90) close(r0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300)=r1, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000510008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00ac0310008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:43 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) (async) socket$kcm(0xa, 0x2, 0x0) 06:14:44 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x25, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x1}, [@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xd}, @jmp={0x5, 0x1, 0x6, 0x1, 0x0, 0x100, 0x1}, @ldst={0x1, 0x3, 0x3, 0x6, 0xa, 0xfffffffffffffff0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8738}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000040)='syzkaller\x00', 0xb6, 0xde, &(0x7f00000004c0)=""/222, 0x41000, 0x1, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0x5, 0x1ff, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000280)=[{0x0, 0x5, 0x3, 0x9}, {0x2, 0x4, 0x3, 0x4}, {0x5, 0x3, 0xc, 0x1}, {0x3, 0x5, 0xb, 0x8}, {0x0, 0x1, 0x7, 0x2}, {0x5, 0x2, 0x5, 0x7}, {0x0, 0x4, 0x2, 0x1}], 0x10, 0xfffffff7}, 0x90) close(r0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300)=r1, 0x4) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r2}, 0x10) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (rerun: 32) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x8) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (rerun: 32) 06:14:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000310008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00fa0310008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000610008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:44 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000500)=r1) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1, 0x1f, &(0x7f0000000840)=@raw=[@map_idx_val={0x18, 0x7}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1a}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x15}, @btf_id={0x18, 0x6, 0x3, 0x0, 0xffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x4}], &(0x7f0000000540)='syzkaller\x00', 0xc82, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0xb, 0xfffffff7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000001a40)=[r1, 0xffffffffffffffff], &(0x7f0000001a80)=[{0x2, 0x3, 0x2, 0x6}], 0x10, 0x10000}, 0x90) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x4, 0xff, 0x0, 0x20, 0x0, 0x5, 0x8001, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x1, 0x4}, 0x100a, 0x4, 0x81, 0x3, 0xffffffffffff8001, 0x1, 0x10, 0x0, 0x6, 0x0, 0x6}, r2, 0xf, r1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0x5) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x100002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r5, 0x58, &(0x7f0000001b80)}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x34100) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_service_time_recursive\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) r10 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@cgroup=r10, r6, 0xc, 0x0, r3, @prog_fd}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[], 0x34100) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0x3, 0xfffffff9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r11, r3], 0x0, 0x10, 0x3f}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 06:14:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x23, 0x1f, 0x1, 0x0, 0x0, 0x6, 0x22008, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x2000, 0x7fffffffffffffff, 0x3, 0x5, 0x10000, 0x9, 0x6}, r0, 0xa, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x10400, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000240)={'nr0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x3f, 0x1000, &(0x7f0000000300)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=[0xffffffffffffffff]}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 06:14:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000510008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000710008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:44 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1, 0x25, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x1}, [@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xff}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xd}, @jmp={0x5, 0x1, 0x6, 0x1, 0x0, 0x100, 0x1}, @ldst={0x1, 0x3, 0x3, 0x6, 0xa, 0xfffffffffffffff0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8738}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000040)='syzkaller\x00', 0xb6, 0xde, &(0x7f00000004c0)=""/222, 0x41000, 0x1, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x0, 0x5, 0x1ff, 0x8}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000280)=[{0x0, 0x5, 0x3, 0x9}, {0x2, 0x4, 0x3, 0x4}, {0x5, 0x3, 0xc, 0x1}, {0x3, 0x5, 0xb, 0x8}, {0x0, 0x1, 0x7, 0x2}, {0x5, 0x2, 0x5, 0x7}, {0x0, 0x4, 0x2, 0x1}], 0x10, 0xfffffff7}, 0x90) close(r0) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300)=r1, 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000680)=0x8) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000610008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000910008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:44 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x0, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:44 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000710008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) (async) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000910008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x23, 0x1f, 0x1, 0x0, 0x0, 0x6, 0x22008, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x2000, 0x7fffffffffffffff, 0x3, 0x5, 0x10000, 0x9, 0x6}, r0, 0xa, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x10400, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000240)={'nr0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x3f, 0x1000, &(0x7f0000000300)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=[0xffffffffffffffff]}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) (async) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) (async) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) (async) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x23, 0x1f, 0x1, 0x0, 0x0, 0x6, 0x22008, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x2000, 0x7fffffffffffffff, 0x3, 0x5, 0x10000, 0x9, 0x6}, r0, 0xa, r1, 0x8) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x10400, 0x0) (async) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000240)={'nr0\x00'}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x3f, 0x1000, &(0x7f0000000300)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=[0xffffffffffffffff]}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) socket$kcm(0xa, 0x2, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) (async) [ 419.116286][T10216] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 420.875168][ T28] audit: type=1800 audit(1705731285.229:11): pid=10257 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=1968 res=0 errno=0 06:14:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 421.069762][T10284] validate_nla: 14 callbacks suppressed [ 421.069785][T10284] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:45 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='memory.swap.current\x00', 0x0, 0x0) close(r1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 421.272103][T10293] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00a90d10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 421.466137][T10300] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:45 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdf, 0xdf, 0x2, [@datasec={0x4, 0x5, 0x0, 0xf, 0x2, [{0x4, 0x7, 0x2}, {0x4, 0x11, 0x5}, {0x1, 0x3ff}, {0x5, 0x8, 0x800}, {0x2, 0x6e, 0x5}], "97ed"}, @datasec={0x9, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x0, 0x1f}, {0x1, 0x200, 0x5}], "ed"}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x4, 0x6}, @var={0x7, 0x0, 0x0, 0xe, 0x4}, @union={0x2, 0x2, 0x0, 0x5, 0x1, 0xfff, [{0x0, 0x1, 0x3}, {0x6, 0x1, 0x7}]}, @enum={0xd, 0x4, 0x0, 0x6, 0x4, [{0x9, 0x97ea}, {0x0, 0xffffffff}, {0x7}, {0x1, 0x3}]}]}}, &(0x7f0000000480)=""/191, 0xfa, 0xbf, 0x0, 0x637}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x387, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ldst={0x1, 0x1, 0x1, 0x2, 0x0, 0x2, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:45 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000500)=r1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1, 0x1f, &(0x7f0000000840)=@raw=[@map_idx_val={0x18, 0x7}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1a}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x15}, @btf_id={0x18, 0x6, 0x3, 0x0, 0xffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x4}], &(0x7f0000000540)='syzkaller\x00', 0xc82, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0xb, 0xfffffff7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000001a40)=[r1, 0xffffffffffffffff], &(0x7f0000001a80)=[{0x2, 0x3, 0x2, 0x6}], 0x10, 0x10000}, 0x90) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) (async) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x4, 0xff, 0x0, 0x20, 0x0, 0x5, 0x8001, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x1, 0x4}, 0x100a, 0x4, 0x81, 0x3, 0xffffffffffff8001, 0x1, 0x10, 0x0, 0x6, 0x0, 0x6}, r2, 0xf, r1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0x5) (async) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x100002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r5, 0x58, &(0x7f0000001b80)}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x34100) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_service_time_recursive\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) (async) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) r10 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x18) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@cgroup=r10, r6, 0xc, 0x0, r3, @prog_fd}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[], 0x34100) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0x3, 0xfffffff9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r11, r3], 0x0, 0x10, 0x3f}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 06:14:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00c50b10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:46 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x0, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 421.667044][T10306] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00aa0d10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 421.791334][ T28] audit: type=1800 audit(1705731286.149:12): pid=10302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=1974 res=0 errno=0 06:14:46 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdf, 0xdf, 0x2, [@datasec={0x4, 0x5, 0x0, 0xf, 0x2, [{0x4, 0x7, 0x2}, {0x4, 0x11, 0x5}, {0x1, 0x3ff}, {0x5, 0x8, 0x800}, {0x2, 0x6e, 0x5}], "97ed"}, @datasec={0x9, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x0, 0x1f}, {0x1, 0x200, 0x5}], "ed"}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x4, 0x6}, @var={0x7, 0x0, 0x0, 0xe, 0x4}, @union={0x2, 0x2, 0x0, 0x5, 0x1, 0xfff, [{0x0, 0x1, 0x3}, {0x6, 0x1, 0x7}]}, @enum={0xd, 0x4, 0x0, 0x6, 0x4, [{0x9, 0x97ea}, {0x0, 0xffffffff}, {0x7}, {0x1, 0x3}]}]}}, &(0x7f0000000480)=""/191, 0xfa, 0xbf, 0x0, 0x637}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x387, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ldst={0x1, 0x1, 0x1, 0x2, 0x0, 0x2, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 421.912848][T10318] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 422.021445][T10321] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000e10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00c60b10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:46 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000500)=r1) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1, 0x1f, &(0x7f0000000840)=@raw=[@map_idx_val={0x18, 0x7}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1a}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x15}, @btf_id={0x18, 0x6, 0x3, 0x0, 0xffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x4}], &(0x7f0000000540)='syzkaller\x00', 0xc82, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0xb, 0xfffffff7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000001a40)=[r1, 0xffffffffffffffff], &(0x7f0000001a80)=[{0x2, 0x3, 0x2, 0x6}], 0x10, 0x10000}, 0x90) (async, rerun: 32) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) (async, rerun: 32) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r4 = perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x4, 0xff, 0x0, 0x20, 0x0, 0x5, 0x8001, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x1, 0x4}, 0x100a, 0x4, 0x81, 0x3, 0xffffffffffff8001, 0x1, 0x10, 0x0, 0x6, 0x0, 0x6}, r2, 0xf, r1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0x5) (async) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x100002, 0x0) (async, rerun: 32) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r5, 0x58, &(0x7f0000001b80)}, 0x10) (async, rerun: 32) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x34100) (async, rerun: 64) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_service_time_recursive\x00', 0x100002, 0x0) (rerun: 64) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) (async, rerun: 32) r10 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x18) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@cgroup=r10, r6, 0xc, 0x0, r3, @prog_fd}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) (async, rerun: 32) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[], 0x34100) (async, rerun: 32) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0x3, 0xfffffff9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r11, r3], 0x0, 0x10, 0x3f}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 06:14:46 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xdf, 0xdf, 0x2, [@datasec={0x4, 0x5, 0x0, 0xf, 0x2, [{0x4, 0x7, 0x2}, {0x4, 0x11, 0x5}, {0x1, 0x3ff}, {0x5, 0x8, 0x800}, {0x2, 0x6e, 0x5}], "97ed"}, @datasec={0x9, 0x2, 0x0, 0xf, 0x1, [{0x2, 0x0, 0x1f}, {0x1, 0x200, 0x5}], "ed"}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x29, 0x0, 0x4, 0x6}, @var={0x7, 0x0, 0x0, 0xe, 0x4}, @union={0x2, 0x2, 0x0, 0x5, 0x1, 0xfff, [{0x0, 0x1, 0x3}, {0x6, 0x1, 0x7}]}, @enum={0xd, 0x4, 0x0, 0x6, 0x4, [{0x9, 0x97ea}, {0x0, 0xffffffff}, {0x7}, {0x1, 0x3}]}]}}, &(0x7f0000000480)=""/191, 0xfa, 0xbf, 0x0, 0x637}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x387, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ldst={0x1, 0x1, 0x1, 0x2, 0x0, 0x2, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x387, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@ldst={0x1, 0x1, 0x1, 0x2, 0x0, 0x2, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 422.396695][T10328] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00c70b10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 422.632964][T10336] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:47 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) (async) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x23, 0x1f, 0x1, 0x0, 0x0, 0x6, 0x22008, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x2000, 0x7fffffffffffffff, 0x3, 0x5, 0x10000, 0x9, 0x6}, r0, 0xa, r1, 0x8) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x10400, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000240)={'nr0\x00'}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x3f, 0x1000, &(0x7f0000000300)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=[0xffffffffffffffff]}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 06:14:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00001f10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 422.775892][T10342] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00c80b10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xac, 0x1, 0xffffffc1, 0x1080, r1, 0x3, '\x00', 0x0, r1, 0x3, 0x5, 0x5, 0xf}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x7d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x21, &(0x7f0000000380)=ANY=[@ANYBLOB="1837000002000000000000000000000018450000f9ffffff000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000186000000f000000000000000500000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085000000a100000018640000040000000000000008000000b70800000000000c7b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a50000008500000085000000"], &(0x7f0000000000)='GPL\x00', 0xff, 0x0, 0x0, 0x41000, 0x15, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=[{0x5, 0x5, 0x3, 0xa}], 0x10, 0x1}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:47 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 423.057232][T10345] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:47 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000500)=r1) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1, 0x1f, &(0x7f0000000840)=@raw=[@map_idx_val={0x18, 0x7}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1a}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x15}, @btf_id={0x18, 0x6, 0x3, 0x0, 0xffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x4}], &(0x7f0000000540)='syzkaller\x00', 0xc82, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0xb, 0xfffffff7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000001a40)=[r1, 0xffffffffffffffff], &(0x7f0000001a80)=[{0x2, 0x3, 0x2, 0x6}], 0x10, 0x10000}, 0x90) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x4, 0xff, 0x0, 0x20, 0x0, 0x5, 0x8001, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x1, 0x4}, 0x100a, 0x4, 0x81, 0x3, 0xffffffffffff8001, 0x1, 0x10, 0x0, 0x6, 0x0, 0x6}, r2, 0xf, r1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0x5) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x100002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r5, 0x58, &(0x7f0000001b80)}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x34100) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_service_time_recursive\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) r10 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@cgroup=r10, r6, 0xc, 0x0, r3, @prog_fd}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[], 0x34100) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0x3, 0xfffffff9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r11, r3], 0x0, 0x10, 0x3f}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 06:14:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00002010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xac, 0x1, 0xffffffc1, 0x1080, r1, 0x3, '\x00', 0x0, r1, 0x3, 0x5, 0x5, 0xf}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x7d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x21, &(0x7f0000000380)=ANY=[@ANYBLOB="1837000002000000000000000000000018450000f9ffffff000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000186000000f000000000000000500000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085000000a100000018640000040000000000000008000000b70800000000000c7b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a50000008500000085000000"], &(0x7f0000000000)='GPL\x00', 0xff, 0x0, 0x0, 0x41000, 0x15, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=[{0x5, 0x5, 0x3, 0xa}], 0x10, 0x1}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:47 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000500)=r1) bpf$PROG_LOAD(0x5, &(0x7f0000001ac0)={0x1, 0x1f, &(0x7f0000000840)=@raw=[@map_idx_val={0x18, 0x7}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1a}}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xb}, @map_fd={0x18, 0x15}, @btf_id={0x18, 0x6, 0x3, 0x0, 0xffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @cb_func={0x18, 0x7, 0x4, 0x0, 0x4}], &(0x7f0000000540)='syzkaller\x00', 0xc82, 0x1000, &(0x7f0000000a40)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0xb, 0xfffffff7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000001a40)=[r1, 0xffffffffffffffff], &(0x7f0000001a80)=[{0x2, 0x3, 0x2, 0x6}], 0x10, 0x10000}, 0x90) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x4, 0xff, 0x0, 0x20, 0x0, 0x5, 0x8001, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x4, @perf_config_ext={0x1, 0x4}, 0x100a, 0x4, 0x81, 0x3, 0xffffffffffff8001, 0x1, 0x10, 0x0, 0x6, 0x0, 0x6}, r2, 0xf, r1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0x5) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.freeze\x00', 0x100002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r5, 0x58, &(0x7f0000001b80)}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000040)=ANY=[], 0x34100) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_service_time_recursive\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) r10 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={@cgroup=r10, r6, 0xc, 0x0, r3, @prog_fd}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(r5, &(0x7f0000000240)=ANY=[], 0x34100) r11 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x27, '\x00', 0x0, 0x0, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x0, 0x4, 0x3, 0xfffffff9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)=[r11, r3], 0x0, 0x10, 0x3f}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 423.208939][ T28] audit: type=1800 audit(1705731287.549:13): pid=10350 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=1966 res=0 errno=0 06:14:47 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xac, 0x1, 0xffffffc1, 0x1080, r1, 0x3, '\x00', 0x0, r1, 0x3, 0x5, 0x5, 0xf}, 0x48) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0xac, 0x1, 0xffffffc1, 0x1080, r1, 0x3, '\x00', 0x0, r1, 0x3, 0x5, 0x5, 0xf}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r2, 0x7d, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) (async) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x21, &(0x7f0000000380)=ANY=[@ANYBLOB="1837000002000000000000000000000018450000f9ffffff000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000186000000f000000000000000500000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085000000a100000018640000040000000000000008000000b70800000000000c7b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a50000008500000085000000"], &(0x7f0000000000)='GPL\x00', 0xff, 0x0, 0x0, 0x41000, 0x15, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=[{0x5, 0x5, 0x3, 0xa}], 0x10, 0x1}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x21, &(0x7f0000000380)=ANY=[@ANYBLOB="1837000002000000000000000000000018450000f9ffffff000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000186000000f000000000000000500000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085000000a100000018640000040000000000000008000000b70800000000000c7b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a50000008500000085000000"], &(0x7f0000000000)='GPL\x00', 0xff, 0x0, 0x0, 0x41000, 0x15, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000000280)={0x2, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000002c0)=[{0x5, 0x5, 0x3, 0xa}], 0x10, 0x1}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000e10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00003f10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:48 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = getpid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x50b, '\x00', r4, r2, 0x3, 0x3, 0x4}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x4, 0x5, 0xff, 0x0, 0xfffffffffffffff8, 0x2000, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xcb34, 0x1, 0x7, 0x7c39, 0x9f0, 0x2, 0x0, 0x2}, r3, 0xc, r1, 0x2) 06:14:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00004810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00001410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:48 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = getpid() (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x50b, '\x00', r4, r2, 0x3, 0x3, 0x4}, 0x48) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x4, 0x5, 0xff, 0x0, 0xfffffffffffffff8, 0x2000, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xcb34, 0x1, 0x7, 0x7c39, 0x9f0, 0x2, 0x0, 0x2}, r3, 0xc, r1, 0x2) 06:14:48 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x23, 0x1f, 0x1, 0x0, 0x0, 0x6, 0x22008, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x2000, 0x7fffffffffffffff, 0x3, 0x5, 0x10000, 0x9, 0x6}, r0, 0xa, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x10400, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000240)={'nr0\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x3f, 0x1000, &(0x7f0000000300)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=[0xffffffffffffffff]}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$kcm(0xa, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 06:14:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00004c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00001f10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:48 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r3 = getpid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x50b, '\x00', r4, r2, 0x3, 0x3, 0x4}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x4, 0x5, 0xff, 0x0, 0xfffffffffffffff8, 0x2000, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xcb34, 0x1, 0x7, 0x7c39, 0x9f0, 0x2, 0x0, 0x2}, r3, 0xc, r1, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) getpid() (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x58, &(0x7f0000000280)}, 0x10) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x50b, '\x00', r4, r2, 0x3, 0x3, 0x4}, 0x48) (async) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x4, 0x5, 0xff, 0x0, 0xfffffffffffffff8, 0x2000, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xcb34, 0x1, 0x7, 0x7c39, 0x9f0, 0x2, 0x0, 0x2}, r3, 0xc, r1, 0x2) (async) 06:14:48 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00655810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00002010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:49 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x18) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0xfff, 0x0, r1, 0x2, '\x00', 0x0, r2, 0x1, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x17, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x1, 0x1, 0x1, 0xa, 0xb}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xa8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x9, 0x0, 0x0, 0xab6181c3e1a3b9e6, 0x4b, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x25, 0x3, 0x81}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[r1, r4, r1], &(0x7f0000000600)=[{0x1, 0x2, 0xd, 0x5}], 0x10, 0x80000001}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x6, '\x00', 0x0, r2, 0x1, 0x5, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:49 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x0, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00003c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x18) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0xfff, 0x0, r1, 0x2, '\x00', 0x0, r2, 0x1, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x17, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x1, 0x1, 0x1, 0xa, 0xb}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xa8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x9, 0x0, 0x0, 0xab6181c3e1a3b9e6, 0x4b, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x25, 0x3, 0x81}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[r1, r4, r1], &(0x7f0000000600)=[{0x1, 0x2, 0xd, 0x5}], 0x10, 0x80000001}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x17, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x1, 0x1, 0x1, 0xa, 0xb}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xa8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x9, 0x0, 0x0, 0xab6181c3e1a3b9e6, 0x4b, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x25, 0x3, 0x81}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[r1, r4, r1], &(0x7f0000000600)=[{0x1, 0x2, 0xd, 0x5}], 0x10, 0x80000001}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x6, '\x00', 0x0, r2, 0x1, 0x5, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00586510008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00013c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)=@generic={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x18) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0xfff, 0x0, r1, 0x2, '\x00', 0x0, r2, 0x1, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x17, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@ldst={0x1, 0x1, 0x1, 0xa, 0xb}, @map_val={0x18, 0x6, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xa8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x9, 0x0, 0x0, 0xab6181c3e1a3b9e6, 0x4b, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f00000004c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x4, 0x25, 0x3, 0x81}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[r1, r4, r1], &(0x7f0000000600)=[{0x1, 0x2, 0xd, 0x5}], 0x10, 0x80000001}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000280)={0x2, 0x4, 0x8, 0x1, 0x80, r1, 0x6, '\x00', 0x0, r2, 0x1, 0x5, 0x3}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:49 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00003f10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00004810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:50 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001100000000000000000000bc79c17516e9cdec997000850e00f3ff9400000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r2 = syz_clone(0x40000, &(0x7f0000000300)="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", 0xfb, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="6eabca2c20144943314c3cbf856a50a3716a27d915c421045cfa2f1fc2ef118d030d75ee7f299e5ff0dda8f23c06bda51858bd21be6b2c016bbec4a71673f14f04a16250e99837a349c7c5a4d42c78ea070af2294fb06eca04178daa9386198aab7d3e54f518a556be0a1dc4055540e814a4e6af0ff40f024bfa461a7cfc859eb76bd0ad2e7d3729c077ebee3c84ab0edc8cec92ed6ec78540bf") perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x5, 0x7f, 0x81, 0xff, 0x0, 0x8, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x6100, 0xc2, 0x1, 0x0, 0x9, 0x7fff, 0x4, 0x0, 0x1, 0x0, 0x20}, r2, 0x5, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r4 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x0, 0x0) [ 425.758497][ T28] audit: type=1800 audit(1705731290.119:14): pid=10404 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=1953 res=0 errno=0 06:14:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xca}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x5d7d) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000002200000003000000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x12) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x2, 0x0, 0x0, 0x24, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) recvmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000680)=""/198, 0xc6}], 0x2, &(0x7f0000000280)=[@cred={{0x1c}}], 0x20}, 0x40010042) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x4) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x8, 0x81, 0x3f, 0x2, 0x0, 0x7, 0x1000, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x4, 0x98b9}, 0x400, 0x7fffffff, 0x80000000, 0x2, 0x7, 0x4, 0xfff, 0x0, 0x6}, r2, 0xffffffffffffffff, r0, 0x1b) socket$kcm(0x10, 0x2, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0xe1, 0x81, 0x0, 0x0, 0x46b, 0x105, 0xb, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x100, 0x200}, 0x4011, 0x3, 0x200, 0x3, 0xcc, 0x1, 0x0, 0x0, 0x1, 0x0, 0xa3}, r2, 0x1, r3, 0x8) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x5c000000, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000012006bab9e3fe3d86e17aa31076b876c1d0000007ea60864160af36504001a0038001d007e31a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f4d4938037e786a6d0bdd7fcf50e4509c5bb5b64f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f005807}, 0x0) 06:14:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00007410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00004c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00007a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:50 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r1 = syz_clone(0x0, &(0x7f0000000200)="50cc9bef5aa71652a001a111ce95daea95706eb1de997f52f31be06bdcf0f72f72177b54a5a2f027fdb60525f2690ebd360220449afc8a2860d522781f16bc8e408b7cada54ee5b8bd74e2f3bbf6893c7b3b0c718593b146ae2160465ec7318de6a585ef99cdbb6a47c41505063adcb77f779465faab19d5b4d298da1cea790164bd2015c58671f388579251e805a1eb285f6aa4aa0d1c234ace62dc1f034add8976d064bac786b7e81fd239d3a95dd34c8cb7505490e38b78d73c3b163557259070389f0c9c2c668317a0980268acd28b28dc91c5568dfae726df951c3187e540b52bd00947534b930e", 0xea, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000300)="d2538df5e82170c12072316b170bd744811edeff8c7bc159ccfe540a5c2e0484034c240e448b205438bbdc322ad6ee9ed08c07159cc7936b89a477443bdc7619c852f97454853febe54cf2a9f08ef4d076028979526d8689c719e6c77103d3a616e89911db84aa45bcd75426355a060c3e59e88ae1445e0f11a9d69db44d7f3239c740030507fb35007dbc382398af7f0d49299a01cf83a161a6c68b82d9667c6a6249814dfd145b650cac88cfdc8c9311d5816da077eca46a24bd7d9e7852bd2f74ba5d326972f08fd4160267dfb19562d49899f7") perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x4, 0x7f, 0x1, 0x11, 0x0, 0xae3, 0x8000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x2}, 0x2, 0x6, 0x1, 0x4, 0x1ff, 0x5, 0x800, 0x0, 0xffffffff, 0x0, 0x7}, r1, 0xa, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 06:14:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00655810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:50 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001100000000000000000000bc79c17516e9cdec997000850e00f3ff9400000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r2 = syz_clone(0x40000, &(0x7f0000000300)="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", 0xfb, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="6eabca2c20144943314c3cbf856a50a3716a27d915c421045cfa2f1fc2ef118d030d75ee7f299e5ff0dda8f23c06bda51858bd21be6b2c016bbec4a71673f14f04a16250e99837a349c7c5a4d42c78ea070af2294fb06eca04178daa9386198aab7d3e54f518a556be0a1dc4055540e814a4e6af0ff40f024bfa461a7cfc859eb76bd0ad2e7d3729c077ebee3c84ab0edc8cec92ed6ec78540bf") perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x5, 0x7f, 0x81, 0xff, 0x0, 0x8, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x6100, 0xc2, 0x1, 0x0, 0x9, 0x7fff, 0x4, 0x0, 0x1, 0x0, 0x20}, r2, 0x5, r1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r4 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x0, 0x0) (async) openat$cgroup_ro(r4, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x0, 0x0) [ 426.270335][T10459] validate_nla: 20 callbacks suppressed [ 426.270360][T10459] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00008110008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 426.457816][T10463] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 426.722516][T10469] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 426.816527][T10467] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 06:14:51 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001100000000000000000000bc79c17516e9cdec997000850e00f3ff9400000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r2 = syz_clone(0x40000, &(0x7f0000000300)="d31897fcaaacd7d67bf5a3cf1a672b09b9c443d8c92d91d1ea94f5c12f9a9543283175c246651e71d5fe78ae7b4ac54ba47e02b4b41f771311507d2d24db2377b32dd0f006557d07f5c359cbe7c38096252050c6b0d08915aaf23f645af87db968fd8170abd5a810b296bf617fe37ac700533212bcafdc503cbbcbf20d0125ef1b834bc679405d3132bc40e5d7d9459ff9401a87eee27270a53d449e0395ea913b1cb58db758222c4e6c966d87dd756bf0166fd439517ecff9b4a192e66607ddd026b403fe8580b674af9c1a8e1d2aefd7b9a178511f6086a946e6ae024712906ef60f40cc8a4e1e0095a2742d5716dcab56c39377d084387f79e7", 0xfb, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)="6eabca2c20144943314c3cbf856a50a3716a27d915c421045cfa2f1fc2ef118d030d75ee7f299e5ff0dda8f23c06bda51858bd21be6b2c016bbec4a71673f14f04a16250e99837a349c7c5a4d42c78ea070af2294fb06eca04178daa9386198aab7d3e54f518a556be0a1dc4055540e814a4e6af0ff40f024bfa461a7cfc859eb76bd0ad2e7d3729c077ebee3c84ab0edc8cec92ed6ec78540bf") perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x5, 0x7f, 0x81, 0xff, 0x0, 0x8, 0x40, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x6100, 0xc2, 0x1, 0x0, 0x9, 0x7fff, 0x4, 0x0, 0x1, 0x0, 0x20}, r2, 0x5, r1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) r4 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000040)='blkio.bfq.sectors\x00', 0x0, 0x0) 06:14:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000da910008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 426.910086][T10476] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 426.946592][T10467] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 06:14:51 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00586510008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xca}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5) (async) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(0xffffffffffffffff) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x5d7d) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000002200000003000000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x18}, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x12) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0) (async) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$kcm(0x21, 0x0, 0x2) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x2, 0x0, 0x0, 0x24, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) openat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) recvmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000680)=""/198, 0xc6}], 0x2, &(0x7f0000000280)=[@cred={{0x1c}}], 0x20}, 0x40010042) (async) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x4) (async) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x8, 0x81, 0x3f, 0x2, 0x0, 0x7, 0x1000, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x4, 0x98b9}, 0x400, 0x7fffffff, 0x80000000, 0x2, 0x7, 0x4, 0xfff, 0x0, 0x6}, r2, 0xffffffffffffffff, r0, 0x1b) (async) socket$kcm(0x10, 0x2, 0x0) (async) gettid() (async) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0xe1, 0x81, 0x0, 0x0, 0x46b, 0x105, 0xb, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x100, 0x200}, 0x4011, 0x3, 0x200, 0x3, 0xcc, 0x1, 0x0, 0x0, 0x1, 0x0, 0xa3}, r2, 0x1, r3, 0x8) (async) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x5c000000, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000012006bab9e3fe3d86e17aa31076b876c1d0000007ea60864160af36504001a0038001d007e31a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f4d4938037e786a6d0bdd7fcf50e4509c5bb5b64f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f005807}, 0x0) [ 427.169245][T10484] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 427.254064][T10487] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000daa10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 427.644120][T10495] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 427.748793][T10499] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:52 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xd, &(0x7f0000000000)=@raw=[@generic={0xfd, 0x9, 0x4, 0x8001, 0x6}, @call={0x85, 0x0, 0x0, 0x1d}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x3, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x7c}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000280)=""/171, 0x41100, 0x4c, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x7, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x2, 0x1, 0x8, 0x9}], 0x10, 0x3}, 0x90) 06:14:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000003008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xca}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5) (rerun: 64) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(0xffffffffffffffff) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x5d7d) (async) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000002200000003000000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x18}, 0x0) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x12) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r4 = socket$kcm(0x10, 0x2, 0x4) (rerun: 64) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x2, 0x0, 0x0, 0x24, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) (async) recvmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000680)=""/198, 0xc6}], 0x2, &(0x7f0000000280)=[@cred={{0x1c}}], 0x20}, 0x40010042) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x4) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x8, 0x81, 0x3f, 0x2, 0x0, 0x7, 0x1000, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x4, 0x98b9}, 0x400, 0x7fffffff, 0x80000000, 0x2, 0x7, 0x4, 0xfff, 0x0, 0x6}, r2, 0xffffffffffffffff, r0, 0x1b) (async) socket$kcm(0x10, 0x2, 0x0) (async) gettid() (async) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0xe1, 0x81, 0x0, 0x0, 0x46b, 0x105, 0xb, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x100, 0x200}, 0x4011, 0x3, 0x200, 0x3, 0xcc, 0x1, 0x0, 0x0, 0x1, 0x0, 0xa3}, r2, 0x1, r3, 0x8) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x5c000000, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000012006bab9e3fe3d86e17aa31076b876c1d0000007ea60864160af36504001a0038001d007e31a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f4d4938037e786a6d0bdd7fcf50e4509c5bb5b64f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f005807}, 0x0) 06:14:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000005008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:52 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r1 = syz_clone(0x0, &(0x7f0000000200)="50cc9bef5aa71652a001a111ce95daea95706eb1de997f52f31be06bdcf0f72f72177b54a5a2f027fdb60525f2690ebd360220449afc8a2860d522781f16bc8e408b7cada54ee5b8bd74e2f3bbf6893c7b3b0c718593b146ae2160465ec7318de6a585ef99cdbb6a47c41505063adcb77f779465faab19d5b4d298da1cea790164bd2015c58671f388579251e805a1eb285f6aa4aa0d1c234ace62dc1f034add8976d064bac786b7e81fd239d3a95dd34c8cb7505490e38b78d73c3b163557259070389f0c9c2c668317a0980268acd28b28dc91c5568dfae726df951c3187e540b52bd00947534b930e", 0xea, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000300)="d2538df5e82170c12072316b170bd744811edeff8c7bc159ccfe540a5c2e0484034c240e448b205438bbdc322ad6ee9ed08c07159cc7936b89a477443bdc7619c852f97454853febe54cf2a9f08ef4d076028979526d8689c719e6c77103d3a616e89911db84aa45bcd75426355a060c3e59e88ae1445e0f11a9d69db44d7f3239c740030507fb35007dbc382398af7f0d49299a01cf83a161a6c68b82d9667c6a6249814dfd145b650cac88cfdc8c9311d5816da077eca46a24bd7d9e7852bd2f74ba5d326972f08fd4160267dfb19562d49899f7") perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x4, 0x7f, 0x1, 0x11, 0x0, 0xae3, 0x8000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x2}, 0x2, 0x6, 0x1, 0x4, 0x1ff, 0x5, 0x800, 0x0, 0xffffffff, 0x0, 0x7}, r1, 0xa, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 06:14:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00027210008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000006008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00007410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:53 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:53 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r1 = syz_clone(0x0, &(0x7f0000000200)="50cc9bef5aa71652a001a111ce95daea95706eb1de997f52f31be06bdcf0f72f72177b54a5a2f027fdb60525f2690ebd360220449afc8a2860d522781f16bc8e408b7cada54ee5b8bd74e2f3bbf6893c7b3b0c718593b146ae2160465ec7318de6a585ef99cdbb6a47c41505063adcb77f779465faab19d5b4d298da1cea790164bd2015c58671f388579251e805a1eb285f6aa4aa0d1c234ace62dc1f034add8976d064bac786b7e81fd239d3a95dd34c8cb7505490e38b78d73c3b163557259070389f0c9c2c668317a0980268acd28b28dc91c5568dfae726df951c3187e540b52bd00947534b930e", 0xea, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000300)="d2538df5e82170c12072316b170bd744811edeff8c7bc159ccfe540a5c2e0484034c240e448b205438bbdc322ad6ee9ed08c07159cc7936b89a477443bdc7619c852f97454853febe54cf2a9f08ef4d076028979526d8689c719e6c77103d3a616e89911db84aa45bcd75426355a060c3e59e88ae1445e0f11a9d69db44d7f3239c740030507fb35007dbc382398af7f0d49299a01cf83a161a6c68b82d9667c6a6249814dfd145b650cac88cfdc8c9311d5816da077eca46a24bd7d9e7852bd2f74ba5d326972f08fd4160267dfb19562d49899f7") perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x4, 0x7f, 0x1, 0x11, 0x0, 0xae3, 0x8000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x2}, 0x2, 0x6, 0x1, 0x4, 0x1ff, 0x5, 0x800, 0x0, 0xffffffff, 0x0, 0x7}, r1, 0xa, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 06:14:53 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xd, &(0x7f0000000000)=@raw=[@generic={0xfd, 0x9, 0x4, 0x8001, 0x6}, @call={0x85, 0x0, 0x0, 0x1d}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x3, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x7c}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000280)=""/171, 0x41100, 0x4c, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x7, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x2, 0x1, 0x8, 0x9}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xd, &(0x7f0000000000)=@raw=[@generic={0xfd, 0x9, 0x4, 0x8001, 0x6}, @call={0x85, 0x0, 0x0, 0x1d}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x3, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x7c}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000280)=""/171, 0x41100, 0x4c, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x7, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x2, 0x1, 0x8, 0x9}], 0x10, 0x3}, 0x90) (async) 06:14:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00007a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000007008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00008110008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000009008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0003a410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:54 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000a008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:54 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0003ac10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:55 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xd, &(0x7f0000000000)=@raw=[@generic={0xfd, 0x9, 0x4, 0x8001, 0x6}, @call={0x85, 0x0, 0x0, 0x1d}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x3, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x7c}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000280)=""/171, 0x41100, 0x4c, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x7, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x2, 0x1, 0x8, 0x9}], 0x10, 0x3}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xd, &(0x7f0000000000)=@raw=[@generic={0xfd, 0x9, 0x4, 0x8001, 0x6}, @call={0x85, 0x0, 0x0, 0x1d}, @map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x2}, @map_fd={0x18, 0x3, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x7c}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xab, &(0x7f0000000280)=""/171, 0x41100, 0x4c, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x7, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f00000003c0)=[{0x2, 0x1, 0x8, 0x9}], 0x10, 0x3}, 0x90) (async) 06:14:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0001be10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:55 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000c008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 431.486959][T10561] validate_nla: 13 callbacks suppressed [ 431.486982][T10561] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000bc510008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 431.624988][T10563] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 431.715046][T10565] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000d008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r1 = syz_clone(0x0, &(0x7f0000000200)="50cc9bef5aa71652a001a111ce95daea95706eb1de997f52f31be06bdcf0f72f72177b54a5a2f027fdb60525f2690ebd360220449afc8a2860d522781f16bc8e408b7cada54ee5b8bd74e2f3bbf6893c7b3b0c718593b146ae2160465ec7318de6a585ef99cdbb6a47c41505063adcb77f779465faab19d5b4d298da1cea790164bd2015c58671f388579251e805a1eb285f6aa4aa0d1c234ace62dc1f034add8976d064bac786b7e81fd239d3a95dd34c8cb7505490e38b78d73c3b163557259070389f0c9c2c668317a0980268acd28b28dc91c5568dfae726df951c3187e540b52bd00947534b930e", 0xea, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000300)="d2538df5e82170c12072316b170bd744811edeff8c7bc159ccfe540a5c2e0484034c240e448b205438bbdc322ad6ee9ed08c07159cc7936b89a477443bdc7619c852f97454853febe54cf2a9f08ef4d076028979526d8689c719e6c77103d3a616e89911db84aa45bcd75426355a060c3e59e88ae1445e0f11a9d69db44d7f3239c740030507fb35007dbc382398af7f0d49299a01cf83a161a6c68b82d9667c6a6249814dfd145b650cac88cfdc8c9311d5816da077eca46a24bd7d9e7852bd2f74ba5d326972f08fd4160267dfb19562d49899f7") perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x4, 0x7f, 0x1, 0x11, 0x0, 0xae3, 0x8000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x2}, 0x2, 0x6, 0x1, 0x4, 0x1ff, 0x5, 0x800, 0x0, 0xffffffff, 0x0, 0x7}, r1, 0xa, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 06:14:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000bc610008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xca}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x5d7d) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000002200000003000000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x12) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x2, 0x0, 0x0, 0x24, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) recvmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000680)=""/198, 0xc6}], 0x2, &(0x7f0000000280)=[@cred={{0x1c}}], 0x20}, 0x40010042) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x4) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x8, 0x81, 0x3f, 0x2, 0x0, 0x7, 0x1000, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x4, 0x98b9}, 0x400, 0x7fffffff, 0x80000000, 0x2, 0x7, 0x4, 0xfff, 0x0, 0x6}, r2, 0xffffffffffffffff, r0, 0x1b) socket$kcm(0x10, 0x2, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0xe1, 0x81, 0x0, 0x0, 0x46b, 0x105, 0xb, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x100, 0x200}, 0x4011, 0x3, 0x200, 0x3, 0xcc, 0x1, 0x0, 0x0, 0x1, 0x0, 0xa3}, r2, 0x1, r3, 0x8) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x5c000000, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000012006bab9e3fe3d86e17aa31076b876c1d0000007ea60864160af36504001a0038001d007e31a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f4d4938037e786a6d0bdd7fcf50e4509c5bb5b64f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f005807}, 0x0) [ 431.941729][T10570] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 431.981954][T10571] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000bc710008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000e008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:56 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:56 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.parent_freezing\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 432.352293][T10583] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 432.435109][T10584] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000bc810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:56 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 432.914129][T10593] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000210008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 432.965001][T10594] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:14:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0002d210008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 433.131114][T10597] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:14:57 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000310008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0003fa10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xca}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x5d7d) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000002200000003000000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x12) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x21, 0x0, 0x2) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x4) close(r4) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r5, &(0x7f0000000000), 0x248800) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x7}, 0x0, 0x2, 0x0, 0x0, 0x24, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup(r5, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) recvmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000680)=""/198, 0xc6}], 0x2, &(0x7f0000000280)=[@cred={{0x1c}}], 0x20}, 0x40010042) ioctl$PERF_EVENT_IOC_RESET(r5, 0x2403, 0x4) perf_event_open(&(0x7f0000000580)={0x0, 0x80, 0x8, 0x81, 0x3f, 0x2, 0x0, 0x7, 0x1000, 0x6, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x4, 0x98b9}, 0x400, 0x7fffffff, 0x80000000, 0x2, 0x7, 0x4, 0xfff, 0x0, 0x6}, r2, 0xffffffffffffffff, r0, 0x1b) socket$kcm(0x10, 0x2, 0x0) gettid() perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0xe1, 0x81, 0x0, 0x0, 0x46b, 0x105, 0xb, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x100, 0x200}, 0x4011, 0x3, 0x200, 0x3, 0xcc, 0x1, 0x0, 0x0, 0x1, 0x0, 0xa3}, r2, 0x1, r3, 0x8) sendmsg$inet(r4, &(0x7f0000000040)={0x0, 0x5c000000, &(0x7f0000000000)=[{&(0x7f0000000100)="5c00000012006bab9e3fe3d86e17aa31076b876c1d0000007ea60864160af36504001a0038001d007e31a0e69ee517d34460bc24eab556a705251e6182949a3651f60a84c9f4d4938037e786a6d0bdd7fcf50e4509c5bb5b64f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f005807}, 0x0) 06:14:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:58 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.parent_freezing\x00', 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000003008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:58 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000510008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000005008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000610008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000006008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:58 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000710008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:58 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = syz_clone(0x10080000, &(0x7f0000000740)="9f57b7acb0ae0a9b6b3d17db9179960137f39942e8de7648c0dfc71c999caaa323d890cee26460979ab9821d2f3ffcc9b9d7847f6a003d063d80c6b27f28faa247825fe13414884a6a8c49534c6fb8666e4a3c5fff82aec586446e1c0d575510efe245e376c8e978e0e3d29d767d002c5006e4724ae5d786", 0x78, &(0x7f0000000040), &(0x7f0000000480), &(0x7f0000000840)="76264cf303b32a3f152b106da25bb7130c7246a53968fedd47afc026c33c61f18e783b609ac337f7038988a6a3151c58a563d649c021f81b4028993e34a4aea0ce6753914bab77265b8939585f4f3393f6938a4ebc5de7853601ce2052adb7d308cb4bfe84a5b0cfb5e1c845a88a1342d1243c63c426582f1ab0879d7fb5aeb0421cb6b9ea8298135eebcb1a5538f792f3359bea953b534b6a53267690f042") perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x6, 0x6, 0x81, 0xab, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x5}, 0x80, 0x9, 0x0, 0x9, 0x7c1, 0x20, 0x45, 0x0, 0xa000000, 0x0, 0x4}, r1, 0xb, r0, 0x2) r2 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffde5) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x6d59) socket$kcm(0x2, 0x3, 0x106) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) openat$cgroup_ro(r4, &(0x7f0000000440)='cgroup.freeze\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="2100000b28221105fd348c0000000001", @ANYRES32, @ANYBLOB="000802ac4aaef01629ddaeea0f1466275ed8ddf17ab537c311f6102fa5064984308008575678d7a23d129e7731ecf5ae39e3ab59725d68ae7a08ac25e8bab5ff8651f037de5f23a2d19f5f214cc9f103d5894b970294cae307e2eee386"], 0x18}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x8, 0x89, &(0x7f00000013c0)=""/137, 0x41100, 0x50, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001540)=[{0x0, 0xfffffffe, 0x10, 0xa}, {0x0, 0x1, 0x8}, {0x3, 0x4, 0xc}], 0x10, 0x1e}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000300)='\x02;\xe5\b\x00\x00\x9c\x00') r6 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r6, 0x0, 0x0) 06:14:59 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.parent_freezing\x00', 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:14:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000007008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000910008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000009008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_clone(0x2001000, &(0x7f0000000340)="ce600f1a715118dd897f4d574a2e07ea9ed31f19b57ba7230f45d7e6a4ed2c70869f87a2792fdb3cdf246a03c3fe4416eb26d7a33962833e471a5654e730dd2bb7025ddc25d321b2889bb38d34a84076b7dc", 0x52, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="33cf413ff839566ed564b9320a9b85d123b59f9603a22a05196963e1ffc0016c5b78b03877627f6855d95983dbe15613c31dfda4f7b3693e3bd60a60fde897147b9475019b7318b69523daaf9569c3b916008013e8f27cc24728c48b0fb133e315c3d9662d7feeb4dbe30e285cc36c184016144481bdfc39bdf39ad131d85f27e5f020443643668b18d872b4727b542970787e88049fc54b2e34728cb417e60e075a77affbb3ca0bae95daaebc372bfa5c32321050d05f040e7d730f2216eaaa2c6dfac5c6fbb668c2b7cd06a94f58801b567f5f7d1b03222502b4a9563e6fc62e914067fc") recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000000b80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001c00)=""/80, 0x50}], 0x3, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xc0}, 0x40012061) sendmsg$unix(0xffffffffffffffff, &(0x7f00000023c0)={&(0x7f0000001f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001f80)="c7b013c52f2e21b968d96d56264dbb25fa3a1628389a", 0x16}, {&(0x7f0000002000)="430af819ca210011b0b8d57dafe69ca377408f0b471e7513bf1f2a757b4a37111d3241a29d7898e0ed8c5e712885beca9c67e558690de97305aceb644e3b4867603da4b84aac5d70a0626df2e7bf118d7a7a8d1e65b142da8d89b5d495303df0b975f943f374012c97526bb3bb625687380a3bd2473e5659aa4d71c48040a0f6d78123a30fcc6a9d77e17829763cc6cdb337f21106609d774f80457c1054eac86ec202e64cf4ec54c9a1a40aa2343a92e5afc4265c3c8459fd74e099eedc309a07c3f8800bab6744d541ae7810af6f0028a15d", 0xd3}], 0x2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r8, @ANYBLOB="00000000180000fdffdb00000000000001000000102e225b966cf4fb68e341622f6aec3cff9fac93c536da274f98092d19b163ee8728b0836a0ba4eba85125e3676458e5b6bf335efa82aa541aa1ad018671478a15a889ea6a3aff274d90fa236eb4bb3d67d2a8efa476ac14b3557deb9a38eb19426526e8dbb47417385148216e0a0de7350d36c0b06ec41cd059136435b9c4ab0af0664aec", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r5, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32=r7, @ANYRES32, @ANYRES32], 0xc8, 0x4008005}, 0x4004800) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)="7a0c050a31d122d71aeb472157e55b36b3020477ee39153867e3dbc7b0981081595e29f6c6ce39ae714f430d5f5c43d8a35f5ce8318f20afd2eadd777305edd32af528d76cd5a218447dfa50f63ca991fccab894b85c2330f7b21a805ba1d7f1a4b9ee28bea1e91c06609d21141e9debce2761a552859226f1890cc9aabaa94ac46afdb1d047899a11fca8ade872371b6b6c", 0x92}, {&(0x7f00000001c0)="b1856002a103b8590cbe4a3f5dc67de5b7d03e8c17118bbf3aa7ed86904b1c69085ea4faa8015a543c65ed8f7542ccfe45f0e377659cdae3328db169724b15f0a4fa1e74b99c5448118debc590d40925cde196e3e29f289652e685c086feb2acabf51e49ffd03bdab9fa45a37e5a171b50e895b074011b1f470c2b8c6232e5a04e02aabd5aa073f1602caf824611634cc18da22e50054c88d00b42ed716a003a48ec18adfdca04672b5a97e2008d616d35db45be1775fdcbacc0c90555cc17", 0xbf}, {&(0x7f0000000280)="a92ee0448ebc7fe120d537a62fae81af1da54c385a6b41edc99a9548e3f935a3739558ce23abdc3884b2402a344b696d2b37cc0eb70e6692fe71fac503bd0fa17225f34006bcfa1b0eb91fb91e31f878c56307a8feed5a897a8363f675fdf201fa", 0x61}], 0x3, &(0x7f0000000540)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, r8}}}], 0x38, 0x4000000}, 0x54) close(r1) r9 = getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r9, 0x12) 06:14:59 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40), 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:14:59 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000a008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:14:59 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = syz_clone(0x10080000, &(0x7f0000000740)="9f57b7acb0ae0a9b6b3d17db9179960137f39942e8de7648c0dfc71c999caaa323d890cee26460979ab9821d2f3ffcc9b9d7847f6a003d063d80c6b27f28faa247825fe13414884a6a8c49534c6fb8666e4a3c5fff82aec586446e1c0d575510efe245e376c8e978e0e3d29d767d002c5006e4724ae5d786", 0x78, &(0x7f0000000040), &(0x7f0000000480), &(0x7f0000000840)="76264cf303b32a3f152b106da25bb7130c7246a53968fedd47afc026c33c61f18e783b609ac337f7038988a6a3151c58a563d649c021f81b4028993e34a4aea0ce6753914bab77265b8939585f4f3393f6938a4ebc5de7853601ce2052adb7d308cb4bfe84a5b0cfb5e1c845a88a1342d1243c63c426582f1ab0879d7fb5aeb0421cb6b9ea8298135eebcb1a5538f792f3359bea953b534b6a53267690f042") perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x6, 0x6, 0x81, 0xab, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x5}, 0x80, 0x9, 0x0, 0x9, 0x7c1, 0x20, 0x45, 0x0, 0xa000000, 0x0, 0x4}, r1, 0xb, r0, 0x2) (async) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x6, 0x6, 0x81, 0xab, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x5}, 0x80, 0x9, 0x0, 0x9, 0x7c1, 0x20, 0x45, 0x0, 0xa000000, 0x0, 0x4}, r1, 0xb, r0, 0x2) r2 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffde5) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x6d59) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x6d59) socket$kcm(0x2, 0x3, 0x106) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) openat$cgroup_ro(r4, &(0x7f0000000440)='cgroup.freeze\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="2100000b28221105fd348c0000000001", @ANYRES32, @ANYBLOB="000802ac4aaef01629ddaeea0f1466275ed8ddf17ab537c311f6102fa5064984308008575678d7a23d129e7731ecf5ae39e3ab59725d68ae7a08ac25e8bab5ff8651f037de5f23a2d19f5f214cc9f103d5894b970294cae307e2eee386"], 0x18}, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="2100000b28221105fd348c0000000001", @ANYRES32, @ANYBLOB="000802ac4aaef01629ddaeea0f1466275ed8ddf17ab537c311f6102fa5064984308008575678d7a23d129e7731ecf5ae39e3ab59725d68ae7a08ac25e8bab5ff8651f037de5f23a2d19f5f214cc9f103d5894b970294cae307e2eee386"], 0x18}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x8, 0x89, &(0x7f00000013c0)=""/137, 0x41100, 0x50, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001540)=[{0x0, 0xfffffffe, 0x10, 0xa}, {0x0, 0x1, 0x8}, {0x3, 0x4, 0xc}], 0x10, 0x1e}, 0x90) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x8, 0x89, &(0x7f00000013c0)=""/137, 0x41100, 0x50, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001540)=[{0x0, 0xfffffffe, 0x10, 0xa}, {0x0, 0x1, 0x8}, {0x3, 0x4, 0xc}], 0x10, 0x1e}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000300)='\x02;\xe5\b\x00\x00\x9c\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000300)='\x02;\xe5\b\x00\x00\x9c\x00') socket$kcm(0xa, 0x922000000003, 0x11) (async) r6 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r6, 0x0, 0x0) 06:15:00 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000950000000000000052a9766c1d30855eb43d54613a177a51c6d0aec3731c0120bcad0fc237da817022855bd317d530c0b172f2c2eb205715d842b6965e77506df2f3eb2c4ddabaa003d5232daafbeee04269d90713425da272b0372aacc3a84ea31c00"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000e10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00001010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_clone(0x2001000, &(0x7f0000000340)="ce600f1a715118dd897f4d574a2e07ea9ed31f19b57ba7230f45d7e6a4ed2c70869f87a2792fdb3cdf246a03c3fe4416eb26d7a33962833e471a5654e730dd2bb7025ddc25d321b2889bb38d34a84076b7dc", 0x52, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="33cf413ff839566ed564b9320a9b85d123b59f9603a22a05196963e1ffc0016c5b78b03877627f6855d95983dbe15613c31dfda4f7b3693e3bd60a60fde897147b9475019b7318b69523daaf9569c3b916008013e8f27cc24728c48b0fb133e315c3d9662d7feeb4dbe30e285cc36c184016144481bdfc39bdf39ad131d85f27e5f020443643668b18d872b4727b542970787e88049fc54b2e34728cb417e60e075a77affbb3ca0bae95daaebc372bfa5c32321050d05f040e7d730f2216eaaa2c6dfac5c6fbb668c2b7cd06a94f58801b567f5f7d1b03222502b4a9563e6fc62e914067fc") (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000000b80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001c00)=""/80, 0x50}], 0x3, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xc0}, 0x40012061) sendmsg$unix(0xffffffffffffffff, &(0x7f00000023c0)={&(0x7f0000001f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001f80)="c7b013c52f2e21b968d96d56264dbb25fa3a1628389a", 0x16}, {&(0x7f0000002000)="430af819ca210011b0b8d57dafe69ca377408f0b471e7513bf1f2a757b4a37111d3241a29d7898e0ed8c5e712885beca9c67e558690de97305aceb644e3b4867603da4b84aac5d70a0626df2e7bf118d7a7a8d1e65b142da8d89b5d495303df0b975f943f374012c97526bb3bb625687380a3bd2473e5659aa4d71c48040a0f6d78123a30fcc6a9d77e17829763cc6cdb337f21106609d774f80457c1054eac86ec202e64cf4ec54c9a1a40aa2343a92e5afc4265c3c8459fd74e099eedc309a07c3f8800bab6744d541ae7810af6f0028a15d", 0xd3}], 0x2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r8, @ANYBLOB="00000000180000fdffdb00000000000001000000102e225b966cf4fb68e341622f6aec3cff9fac93c536da274f98092d19b163ee8728b0836a0ba4eba85125e3676458e5b6bf335efa82aa541aa1ad018671478a15a889ea6a3aff274d90fa236eb4bb3d67d2a8efa476ac14b3557deb9a38eb19426526e8dbb47417385148216e0a0de7350d36c0b06ec41cd059136435b9c4ab0af0664aec", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r5, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32=r7, @ANYRES32, @ANYRES32], 0xc8, 0x4008005}, 0x4004800) (async) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)="7a0c050a31d122d71aeb472157e55b36b3020477ee39153867e3dbc7b0981081595e29f6c6ce39ae714f430d5f5c43d8a35f5ce8318f20afd2eadd777305edd32af528d76cd5a218447dfa50f63ca991fccab894b85c2330f7b21a805ba1d7f1a4b9ee28bea1e91c06609d21141e9debce2761a552859226f1890cc9aabaa94ac46afdb1d047899a11fca8ade872371b6b6c", 0x92}, {&(0x7f00000001c0)="b1856002a103b8590cbe4a3f5dc67de5b7d03e8c17118bbf3aa7ed86904b1c69085ea4faa8015a543c65ed8f7542ccfe45f0e377659cdae3328db169724b15f0a4fa1e74b99c5448118debc590d40925cde196e3e29f289652e685c086feb2acabf51e49ffd03bdab9fa45a37e5a171b50e895b074011b1f470c2b8c6232e5a04e02aabd5aa073f1602caf824611634cc18da22e50054c88d00b42ed716a003a48ec18adfdca04672b5a97e2008d616d35db45be1775fdcbacc0c90555cc17", 0xbf}, {&(0x7f0000000280)="a92ee0448ebc7fe120d537a62fae81af1da54c385a6b41edc99a9548e3f935a3739558ce23abdc3884b2402a344b696d2b37cc0eb70e6692fe71fac503bd0fa17225f34006bcfa1b0eb91fb91e31f878c56307a8feed5a897a8363f675fdf201fa", 0x61}], 0x3, &(0x7f0000000540)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, r8}}}], 0x38, 0x4000000}, 0x54) (async) close(r1) r9 = getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r9, 0x12) 06:15:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000c008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00004810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000950000000000000052a9766c1d30855eb43d54613a177a51c6d0aec3731c0120bcad0fc237da817022855bd317d530c0b172f2c2eb205715d842b6965e77506df2f3eb2c4ddabaa003d5232daafbeee04269d90713425da272b0372aacc3a84ea31c00"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000d008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00004c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:00 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_clone(0x2001000, &(0x7f0000000340)="ce600f1a715118dd897f4d574a2e07ea9ed31f19b57ba7230f45d7e6a4ed2c70869f87a2792fdb3cdf246a03c3fe4416eb26d7a33962833e471a5654e730dd2bb7025ddc25d321b2889bb38d34a84076b7dc", 0x52, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="33cf413ff839566ed564b9320a9b85d123b59f9603a22a05196963e1ffc0016c5b78b03877627f6855d95983dbe15613c31dfda4f7b3693e3bd60a60fde897147b9475019b7318b69523daaf9569c3b916008013e8f27cc24728c48b0fb133e315c3d9662d7feeb4dbe30e285cc36c184016144481bdfc39bdf39ad131d85f27e5f020443643668b18d872b4727b542970787e88049fc54b2e34728cb417e60e075a77affbb3ca0bae95daaebc372bfa5c32321050d05f040e7d730f2216eaaa2c6dfac5c6fbb668c2b7cd06a94f58801b567f5f7d1b03222502b4a9563e6fc62e914067fc") (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ec0)={&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000000b80)=""/4096, 0x1000}, {0x0}, {&(0x7f0000001c00)=""/80, 0x50}], 0x3, &(0x7f0000001d80)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xc0}, 0x40012061) sendmsg$unix(0xffffffffffffffff, &(0x7f00000023c0)={&(0x7f0000001f00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000001f80)="c7b013c52f2e21b968d96d56264dbb25fa3a1628389a", 0x16}, {&(0x7f0000002000)="430af819ca210011b0b8d57dafe69ca377408f0b471e7513bf1f2a757b4a37111d3241a29d7898e0ed8c5e712885beca9c67e558690de97305aceb644e3b4867603da4b84aac5d70a0626df2e7bf118d7a7a8d1e65b142da8d89b5d495303df0b975f943f374012c97526bb3bb625687380a3bd2473e5659aa4d71c48040a0f6d78123a30fcc6a9d77e17829763cc6cdb337f21106609d774f80457c1054eac86ec202e64cf4ec54c9a1a40aa2343a92e5afc4265c3c8459fd74e099eedc309a07c3f8800bab6744d541ae7810af6f0028a15d", 0xd3}], 0x2, &(0x7f0000002ec0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r8, @ANYBLOB="00000000180000fdffdb00000000000001000000102e225b966cf4fb68e341622f6aec3cff9fac93c536da274f98092d19b163ee8728b0836a0ba4eba85125e3676458e5b6bf335efa82aa541aa1ad018671478a15a889ea6a3aff274d90fa236eb4bb3d67d2a8efa476ac14b3557deb9a38eb19426526e8dbb47417385148216e0a0de7350d36c0b06ec41cd059136435b9c4ab0af0664aec", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r5, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32=r7, @ANYRES32, @ANYRES32], 0xc8, 0x4008005}, 0x4004800) (async) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000100)="7a0c050a31d122d71aeb472157e55b36b3020477ee39153867e3dbc7b0981081595e29f6c6ce39ae714f430d5f5c43d8a35f5ce8318f20afd2eadd777305edd32af528d76cd5a218447dfa50f63ca991fccab894b85c2330f7b21a805ba1d7f1a4b9ee28bea1e91c06609d21141e9debce2761a552859226f1890cc9aabaa94ac46afdb1d047899a11fca8ade872371b6b6c", 0x92}, {&(0x7f00000001c0)="b1856002a103b8590cbe4a3f5dc67de5b7d03e8c17118bbf3aa7ed86904b1c69085ea4faa8015a543c65ed8f7542ccfe45f0e377659cdae3328db169724b15f0a4fa1e74b99c5448118debc590d40925cde196e3e29f289652e685c086feb2acabf51e49ffd03bdab9fa45a37e5a171b50e895b074011b1f470c2b8c6232e5a04e02aabd5aa073f1602caf824611634cc18da22e50054c88d00b42ed716a003a48ec18adfdca04672b5a97e2008d616d35db45be1775fdcbacc0c90555cc17", 0xbf}, {&(0x7f0000000280)="a92ee0448ebc7fe120d537a62fae81af1da54c385a6b41edc99a9548e3f935a3739558ce23abdc3884b2402a344b696d2b37cc0eb70e6692fe71fac503bd0fa17225f34006bcfa1b0eb91fb91e31f878c56307a8feed5a897a8363f675fdf201fa", 0x61}], 0x3, &(0x7f0000000540)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, r8}}}], 0x38, 0x4000000}, 0x54) (async) close(r1) r9 = getpid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r9, 0x12) 06:15:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000e008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:00 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = syz_clone(0x10080000, &(0x7f0000000740)="9f57b7acb0ae0a9b6b3d17db9179960137f39942e8de7648c0dfc71c999caaa323d890cee26460979ab9821d2f3ffcc9b9d7847f6a003d063d80c6b27f28faa247825fe13414884a6a8c49534c6fb8666e4a3c5fff82aec586446e1c0d575510efe245e376c8e978e0e3d29d767d002c5006e4724ae5d786", 0x78, &(0x7f0000000040), &(0x7f0000000480), &(0x7f0000000840)="76264cf303b32a3f152b106da25bb7130c7246a53968fedd47afc026c33c61f18e783b609ac337f7038988a6a3151c58a563d649c021f81b4028993e34a4aea0ce6753914bab77265b8939585f4f3393f6938a4ebc5de7853601ce2052adb7d308cb4bfe84a5b0cfb5e1c845a88a1342d1243c63c426582f1ab0879d7fb5aeb0421cb6b9ea8298135eebcb1a5538f792f3359bea953b534b6a53267690f042") perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x6, 0x6, 0x81, 0xab, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x2, @perf_config_ext={0x5}, 0x80, 0x9, 0x0, 0x9, 0x7c1, 0x20, 0x45, 0x0, 0xa000000, 0x0, 0x4}, r1, 0xb, r0, 0x2) (async) r2 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffde5) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x6d59) socket$kcm(0x2, 0x3, 0x106) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) (async, rerun: 64) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (rerun: 64) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) (async) openat$cgroup_ro(r4, &(0x7f0000000440)='cgroup.freeze\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="2100000b28221105fd348c0000000001", @ANYRES32, @ANYBLOB="000802ac4aaef01629ddaeea0f1466275ed8ddf17ab537c311f6102fa5064984308008575678d7a23d129e7731ecf5ae39e3ab59725d68ae7a08ac25e8bab5ff8651f037de5f23a2d19f5f214cc9f103d5894b970294cae307e2eee386"], 0x18}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001580)=@bpf_lsm={0x1d, 0x7, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0, 0x8, 0x89, &(0x7f00000013c0)=""/137, 0x41100, 0x50, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001540)=[{0x0, 0xfffffffe, 0x10, 0xa}, {0x0, 0x1, 0x8}, {0x3, 0x4, 0xc}], 0x10, 0x1e}, 0x90) (async, rerun: 32) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000300)='\x02;\xe5\b\x00\x00\x9c\x00') (async) r6 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$kcm(r6, 0x0, 0x0) [ 436.505717][T10700] validate_nla: 25 callbacks suppressed [ 436.505742][T10700] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 436.585212][T10703] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:01 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000950000000000000052a9766c1d30855eb43d54613a177a51c6d0aec3731c0120bcad0fc237da817022855bd317d530c0b172f2c2eb205715d842b6965e77506df2f3eb2c4ddabaa003d5232daafbeee04269d90713425da272b0372aacc3a84ea31c00"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 436.820454][T10716] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 436.939620][T10721] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000210008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 437.106584][T10726] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:01 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000d008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00007410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 437.242938][T10731] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:01 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000310008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 437.333409][T10736] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:01 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:01 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00007a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:01 executing program 0: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x5, 0x8, 0x4, 0x1}, 0x10, 0x10369, 0xffffffffffffffff, 0x0, &(0x7f0000000140)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x80}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000400)={0x8, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0x0, @prog_id, r2}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@map=0x1, r0, 0xf, 0x28, 0x0, @link_id=r1, r2}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 437.474331][T10741] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 437.620426][T10743] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 437.686769][T10748] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000510008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000610008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:02 executing program 3: socketpair(0x0, 0x41c84654d7348151, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ad}, [@ldst={0x3, 0x0, 0x1, 0x7, 0x0, 0x18}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3ff, 0x38, &(0x7f0000000640)=""/56, 0x41100, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000680)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xe, 0x81, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000700)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000740)=[{0x2, 0x5, 0xd, 0x4}, {0x2, 0x4, 0xa, 0x8}, {0x3, 0x4, 0xa, 0x7}, {0x2, 0x5, 0xd, 0x6}, {0x2, 0x2, 0xf, 0xa}, {0x2, 0x1, 0x6}, {0x5, 0x1, 0x0, 0xb}], 0x10, 0x5a1}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x60000000, 0x0, 0xffffffffffffff98, 0x0, 0x0, 0x3, 0x0, 0x909}, 0x50) perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x1, 0xfb, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1b1}, 0x1100b, 0xe1, 0x0, 0x0, 0x0, 0xcc}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880), 0x10}, 0x90) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x1}, 0xc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x1, &(0x7f0000000b00)=ANY=[@ANYBLOB="25080000637504002480e4ea4468e800780000009600c7a9f2c92ce3aca0aac75a0b5fdd96749f43abfb707485e04aabcdc462cd621015253554872f1f09b586ac17933226b3f7595ec8872c254ac8cdd032945c00"/99], &(0x7f0000000440)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x1, 0xff, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0x1, r3]}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000007000000000000000300000018320000", @ANYRES32=r2, @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0x0, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xa, 0xa, &(0x7f00000002c0)=@raw=[@generic={0x7f, 0x0, 0xb, 0x5, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], &(0x7f0000000380)='GPL\x00', 0x3ff, 0x1000, &(0x7f0000001440)=""/4096, 0x40f00, 0x68, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f00000012c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x1, 0x9, 0x81, 0x7}, 0x10, 0x0, r5, 0x3, &(0x7f0000002480)=[r3, r2, 0xffffffffffffffff, r3, r3, r2, 0xffffffffffffffff], &(0x7f00000024c0)=[{0x1, 0x2, 0x8, 0x7}, {0x2, 0x2, 0x7, 0x6}, {0x4, 0x4, 0x6, 0x2}], 0x10, 0x935}, 0x90) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7, 0x0, 0x0, 0x0, 0x2}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x8, 0x9}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r6}, {}, {0x46, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7e, 0x4, 0x0, 0x80, 0x0, 0x6ca28bd9, 0x8, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x14000, 0x0, 0x0, 0xd, 0x80000001, 0x8, 0x1000, 0x0, 0x2, 0x0, 0x8}, r8, 0xd, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x401, 0x0}, 0x52) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x1, 0x1000, &(0x7f0000001d40)=""/4096, 0x40f00, 0x32, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000900), 0x8, 0x10, &(0x7f0000000700)={0x5, 0x0, 0x8, 0x3}, 0x10, r12, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r13], 0x0, 0x10, 0xffffffff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000035c0)={0x5, 0x21, &(0x7f0000000f40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9f3, 0x0, 0x0, 0x0, 0x18}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @alu={0x4, 0xc284eb7ecbfbb4e3, 0x2, 0x6, 0xac7dd7c7d2c216c2, 0x0, 0xffffffffffffffff}, @map_idx={0x18, 0xf, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000900)='GPL\x00', 0x22, 0x1000, &(0x7f00000025c0)=""/4096, 0x41000, 0x61, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f0000001280)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001300)={0x4, 0x1, 0x96a00000, 0x7}, 0x10, r12, r10, 0x2, &(0x7f0000001340)=[r9, r7, 0x1], &(0x7f0000001380)=[{0x5, 0x5, 0xc, 0x7}, {0x5, 0x1, 0xa, 0x9}], 0x10, 0x1}, 0x90) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000001080)=ANY=[@ANYBLOB="180800000200000000000000000000001811f36436b238364bf86632da71fbf831f745cb186aacdbdb2f7173e2e9a25e0200000000000000dc1fde3b71257d7a7390402c0987ca0f3d8341bf6bc683bfa289028c1509792e428a596b59743ab6a9aea322f5493e0b1fbfb3be396fda1f23e7", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7020000000000007b9af8ff00000000b5090800000000007baaf0ff00000000bf9800000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018280000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000004600000076000000bf9100000000000056080000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 06:15:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000012008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000002f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:02 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x5, 0x8, 0x4, 0x1}, 0x10, 0x10369, 0xffffffffffffffff, 0x0, &(0x7f0000000140)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x80}, 0x90) (async) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x5, 0x8, 0x4, 0x1}, 0x10, 0x10369, 0xffffffffffffffff, 0x0, &(0x7f0000000140)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x80}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000400)={0x8, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x0, 0x0}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0x0, @prog_id, r2}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@map=0x1, r0, 0xf, 0x28, 0x0, @link_id=r1, r2}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000710008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:02 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000007b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:03 executing program 0: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x5, 0x8, 0x4, 0x1}, 0x10, 0x10369, 0xffffffffffffffff, 0x0, &(0x7f0000000140)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], 0x0, 0x10, 0x80}, 0x90) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000400)={0x8}, 0x8) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000400)={0x8, 0x0}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000400)={@cgroup, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x0, 0x0, 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@cgroup, 0xffffffffffffffff, 0x0, 0x0, 0x0, @prog_id, r2}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)={@map=0x1, r0, 0xf, 0x28, 0x0, @link_id=r1, r2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000002008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000910008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000003008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000004008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:03 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:03 executing program 3: socketpair(0x0, 0x41c84654d7348151, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ad}, [@ldst={0x3, 0x0, 0x1, 0x7, 0x0, 0x18}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3ff, 0x38, &(0x7f0000000640)=""/56, 0x41100, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000680)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xe, 0x81, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000700)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000740)=[{0x2, 0x5, 0xd, 0x4}, {0x2, 0x4, 0xa, 0x8}, {0x3, 0x4, 0xa, 0x7}, {0x2, 0x5, 0xd, 0x6}, {0x2, 0x2, 0xf, 0xa}, {0x2, 0x1, 0x6}, {0x5, 0x1, 0x0, 0xb}], 0x10, 0x5a1}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x60000000, 0x0, 0xffffffffffffff98, 0x0, 0x0, 0x3, 0x0, 0x909}, 0x50) (async) perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x1, 0xfb, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1b1}, 0x1100b, 0xe1, 0x0, 0x0, 0x0, 0xcc}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880), 0x10}, 0x90) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x1}, 0xc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x1, &(0x7f0000000b00)=ANY=[@ANYBLOB="25080000637504002480e4ea4468e800780000009600c7a9f2c92ce3aca0aac75a0b5fdd96749f43abfb707485e04aabcdc462cd621015253554872f1f09b586ac17933226b3f7595ec8872c254ac8cdd032945c00"/99], &(0x7f0000000440)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x1, 0xff, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0x1, r3]}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000007000000000000000300000018320000", @ANYRES32=r2, @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0x0, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xa, 0xa, &(0x7f00000002c0)=@raw=[@generic={0x7f, 0x0, 0xb, 0x5, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], &(0x7f0000000380)='GPL\x00', 0x3ff, 0x1000, &(0x7f0000001440)=""/4096, 0x40f00, 0x68, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f00000012c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x1, 0x9, 0x81, 0x7}, 0x10, 0x0, r5, 0x3, &(0x7f0000002480)=[r3, r2, 0xffffffffffffffff, r3, r3, r2, 0xffffffffffffffff], &(0x7f00000024c0)=[{0x1, 0x2, 0x8, 0x7}, {0x2, 0x2, 0x7, 0x6}, {0x4, 0x4, 0x6, 0x2}], 0x10, 0x935}, 0x90) (async, rerun: 64) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7, 0x0, 0x0, 0x0, 0x2}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x8, 0x9}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r6}, {}, {0x46, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r8 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7e, 0x4, 0x0, 0x80, 0x0, 0x6ca28bd9, 0x8, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x14000, 0x0, 0x0, 0xd, 0x80000001, 0x8, 0x1000, 0x0, 0x2, 0x0, 0x8}, r8, 0xd, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x401, 0x0}, 0x52) (async) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x1, 0x1000, &(0x7f0000001d40)=""/4096, 0x40f00, 0x32, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000900), 0x8, 0x10, &(0x7f0000000700)={0x5, 0x0, 0x8, 0x3}, 0x10, r12, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r13], 0x0, 0x10, 0xffffffff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000035c0)={0x5, 0x21, &(0x7f0000000f40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9f3, 0x0, 0x0, 0x0, 0x18}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @alu={0x4, 0xc284eb7ecbfbb4e3, 0x2, 0x6, 0xac7dd7c7d2c216c2, 0x0, 0xffffffffffffffff}, @map_idx={0x18, 0xf, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000900)='GPL\x00', 0x22, 0x1000, &(0x7f00000025c0)=""/4096, 0x41000, 0x61, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f0000001280)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001300)={0x4, 0x1, 0x96a00000, 0x7}, 0x10, r12, r10, 0x2, &(0x7f0000001340)=[r9, r7, 0x1], &(0x7f0000001380)=[{0x5, 0x5, 0xc, 0x7}, {0x5, 0x1, 0xa, 0x9}], 0x10, 0x1}, 0x90) (async) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000001080)=ANY=[@ANYBLOB="180800000200000000000000000000001811f36436b238364bf86632da71fbf831f745cb186aacdbdb2f7173e2e9a25e0200000000000000dc1fde3b71257d7a7390402c0987ca0f3d8341bf6bc683bfa289028c1509792e428a596b59743ab6a9aea322f5493e0b1fbfb3be396fda1f23e7", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7020000000000007b9af8ff00000000b5090800000000007baaf0ff00000000bf9800000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018280000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000004600000076000000bf9100000000000056080000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 06:15:04 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x0, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000005008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e4000"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x5cc, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc01, 0x0, 0x0, 0x0, 0xfffffffc}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x401}, @call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x94, &(0x7f0000000280)=""/148, 0x1f00, 0x10, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x2, 0xfb50, 0xf}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[r1, r1, r1, r1, r2, r1, r1, r1, r1], &(0x7f0000000400)=[{0x5, 0x1, 0x7, 0x5}, {0x5, 0x5, 0xc, 0x8}, {0x5, 0x4, 0xa, 0xe}, {0x5, 0x5, 0x6, 0x4}, {0x3, 0x5, 0xd, 0x6}, {0x5, 0x4, 0x6}, {0x4, 0x1, 0xe, 0x2}], 0x10, 0x9}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000e10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000006008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00001010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000007008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00001410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:04 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e4000"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async, rerun: 64) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x5cc, 0x10}, 0xc) (rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc01, 0x0, 0x0, 0x0, 0xfffffffc}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x401}, @call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x94, &(0x7f0000000280)=""/148, 0x1f00, 0x10, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x2, 0xfb50, 0xf}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[r1, r1, r1, r1, r2, r1, r1, r1, r1], &(0x7f0000000400)=[{0x5, 0x1, 0x7, 0x5}, {0x5, 0x5, 0xc, 0x8}, {0x5, 0x4, 0xa, 0xe}, {0x5, 0x5, 0x6, 0x4}, {0x3, 0x5, 0xd, 0x6}, {0x5, 0x4, 0x6}, {0x4, 0x1, 0xe, 0x2}], 0x10, 0x9}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:04 executing program 3: socketpair(0x0, 0x41c84654d7348151, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 32) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (rerun: 32) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ad}, [@ldst={0x3, 0x0, 0x1, 0x7, 0x0, 0x18}]}, &(0x7f00000001c0)='syzkaller\x00', 0x3ff, 0x38, &(0x7f0000000640)=""/56, 0x41100, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000680)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xe, 0x81, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000700)=[0x1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000740)=[{0x2, 0x5, 0xd, 0x4}, {0x2, 0x4, 0xa, 0x8}, {0x3, 0x4, 0xa, 0x7}, {0x2, 0x5, 0xd, 0x6}, {0x2, 0x2, 0xf, 0xa}, {0x2, 0x1, 0x6}, {0x5, 0x1, 0x0, 0xb}], 0x10, 0x5a1}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x60000000, 0x0, 0xffffffffffffff98, 0x0, 0x0, 0x3, 0x0, 0x909}, 0x50) (async) perf_event_open$cgroup(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x1, 0xfb, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1b1}, 0x1100b, 0xe1, 0x0, 0x0, 0x0, 0xcc}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x8) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000880), 0x10}, 0x90) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x1}, 0xc) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x0, 0x1, &(0x7f0000000b00)=ANY=[@ANYBLOB="25080000637504002480e4ea4468e800780000009600c7a9f2c92ce3aca0aac75a0b5fdd96749f43abfb707485e04aabcdc462cd621015253554872f1f09b586ac17933226b3f7595ec8872c254ac8cdd032945c00"/99], &(0x7f0000000440)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x1, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x1, 0xff, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[0x1, r3]}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xd, 0x18, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000007000000000000000300000018320000", @ANYRES32=r2, @ANYRES32, @ANYBLOB="0000000000000000b70500080000000085000000a50000009500000000000000f8cdc03ce37cd12f7f8507c3649cafa2eaf3f7c257035cefbb04ff101ff90c72d10b633afb0be61d4511461248adeac46698"], &(0x7f00000009c0)='GPL\x00', 0x0, 0xa8, &(0x7f0000000a00)=""/168, 0x41100, 0x2, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002500)={0xa, 0xa, &(0x7f00000002c0)=@raw=[@generic={0x7f, 0x0, 0xb, 0x5, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}], &(0x7f0000000380)='GPL\x00', 0x3ff, 0x1000, &(0x7f0000001440)=""/4096, 0x40f00, 0x68, '\x00', 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f00000012c0)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000002440)={0x1, 0x9, 0x81, 0x7}, 0x10, 0x0, r5, 0x3, &(0x7f0000002480)=[r3, r2, 0xffffffffffffffff, r3, r3, r2, 0xffffffffffffffff], &(0x7f00000024c0)=[{0x1, 0x2, 0x8, 0x7}, {0x2, 0x2, 0x7, 0x6}, {0x4, 0x4, 0x6, 0x2}], 0x10, 0x935}, 0x90) (async) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7, 0x0, 0x0, 0x0, 0x2}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x8, 0x9}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r6}, {}, {0x46, 0x0, 0x0, 0x76}}], {{}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7e, 0x4, 0x0, 0x80, 0x0, 0x6ca28bd9, 0x8, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x400, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x14000, 0x0, 0x0, 0xd, 0x80000001, 0x8, 0x1000, 0x0, 0x2, 0x0, 0x8}, r8, 0xd, 0xffffffffffffffff, 0x0) (async) r9 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async, rerun: 32) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000740)={0x401, 0x0}, 0x52) (async) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x9, 0x0, 0x0, &(0x7f0000000340)='GPL\x00', 0x1, 0x1000, &(0x7f0000001d40)=""/4096, 0x40f00, 0x32, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000900), 0x8, 0x10, &(0x7f0000000700)={0x5, 0x0, 0x8, 0x3}, 0x10, r12, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r13], 0x0, 0x10, 0xffffffff}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000035c0)={0x5, 0x21, &(0x7f0000000f40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9f3, 0x0, 0x0, 0x0, 0x18}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @alu={0x4, 0xc284eb7ecbfbb4e3, 0x2, 0x6, 0xac7dd7c7d2c216c2, 0x0, 0xffffffffffffffff}, @map_idx={0x18, 0xf, 0x5, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000900)='GPL\x00', 0x22, 0x1000, &(0x7f00000025c0)=""/4096, 0x41000, 0x61, '\x00', 0x0, 0xd, r0, 0x8, &(0x7f0000001280)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001300)={0x4, 0x1, 0x96a00000, 0x7}, 0x10, r12, r10, 0x2, &(0x7f0000001340)=[r9, r7, 0x1], &(0x7f0000001380)=[{0x5, 0x5, 0xc, 0x7}, {0x5, 0x1, 0xa, 0x9}], 0x10, 0x1}, 0x90) r14 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000001080)=ANY=[@ANYBLOB="180800000200000000000000000000001811f36436b238364bf86632da71fbf831f745cb186aacdbdb2f7173e2e9a25e0200000000000000dc1fde3b71257d7a7390402c0987ca0f3d8341bf6bc683bfa289028c1509792e428a596b59743ab6a9aea322f5493e0b1fbfb3be396fda1f23e7", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000b7020000000000007b9af8ff00000000b5090800000000007baaf0ff00000000bf9800000000000007080000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018280000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7050000080000004600000076000000bf9100000000000056080000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 06:15:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000008008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00003c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00004810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:05 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x0, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000009008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00004c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000a008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 441.552494][T10852] validate_nla: 27 callbacks suppressed [ 441.552517][T10852] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 441.640953][T10858] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:06 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e4000"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x5cc, 0x10}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc01, 0x0, 0x0, 0x0, 0xfffffffc}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x401}, @call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x94, &(0x7f0000000280)=""/148, 0x1f00, 0x10, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x2, 0xfb50, 0xf}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[r1, r1, r1, r1, r2, r1, r1, r1, r1], &(0x7f0000000400)=[{0x5, 0x1, 0x7, 0x5}, {0x5, 0x5, 0xc, 0x8}, {0x5, 0x4, 0xa, 0xe}, {0x5, 0x5, 0x6, 0x4}, {0x3, 0x5, 0xd, 0x6}, {0x5, 0x4, 0x6}, {0x4, 0x1, 0xe, 0x2}], 0x10, 0x9}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e4000"/32], &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x5cc, 0x10}, 0xc) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffc01, 0x0, 0x0, 0x0, 0xfffffffc}, [@map_idx_val={0x18, 0x6, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0x401}, @call={0x85, 0x0, 0x0, 0x70}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x94, &(0x7f0000000280)=""/148, 0x1f00, 0x10, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000080)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0x2, 0xfb50, 0xf}, 0x10, 0x0, 0x0, 0x7, &(0x7f00000003c0)=[r1, r1, r1, r1, r2, r1, r1, r1, r1], &(0x7f0000000400)=[{0x5, 0x1, 0x7, 0x5}, {0x5, 0x5, 0xc, 0x8}, {0x5, 0x4, 0xa, 0xe}, {0x5, 0x5, 0x6, 0x4}, {0x3, 0x5, 0xd, 0x6}, {0x5, 0x4, 0x6}, {0x4, 0x1, 0xe, 0x2}], 0x10, 0x9}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) [ 441.864590][T10861] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:06 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x0, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 441.963955][T10863] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00006c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000c008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 442.223934][T10867] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000340)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, '\x00', 0x0, r1, 0x1, 0x5, 0x5}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffdfb0}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47}, 0x7d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:06 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 442.394971][T10874] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:06 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000d008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00007410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000340)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, '\x00', 0x0, r1, 0x1, 0x5, 0x5}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffdfb0}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47}, 0x7d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:07 executing program 3: bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000024000000850000002a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) [ 442.645825][T10881] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 442.693204][T10882] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000e008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00007a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000340)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000280)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, '\x00', 0x0, r1, 0x1, 0x5, 0x5}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffdfb0}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@map_idx={0x18, 0x2, 0x5, 0x0, 0xe}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x47}, 0x7d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:07 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x0, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 443.031451][T10896] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:07 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@map=r1, 0x4, 0x1, 0x5aa1, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 443.041522][T10895] syz-executor.3[10895] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 443.098816][T10899] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:07 executing program 3: bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async, rerun: 64) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000024000000850000002a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 06:15:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:07 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@map=r1, 0x4, 0x1, 0x5aa1, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@map=r1, 0x4, 0x1, 0x5aa1, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) 06:15:07 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000012008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 443.529347][T10918] syz-executor.3[10918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 06:15:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000012008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:08 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@map=r1, 0x4, 0x1, 0x5aa1, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@map=r1, 0x4, 0x1, 0x5aa1, &(0x7f0000000000)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) 06:15:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000002f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 443.548576][T10918] syz-executor.3[10918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 06:15:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000002f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 443.813437][T10918] syz-executor.3[10918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 06:15:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000007b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:08 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x4, 0xa, &(0x7f0000000780)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4114af44, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xae, &(0x7f0000000800)=""/174, 0x40f00, 0x6, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x6, 0x65, 0x7f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[r0], 0x0, 0x10, 0x4}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000300), &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380), 0x0, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0x3, [@int={0xa, 0x0, 0x0, 0x1, 0x0, 0x54, 0x0, 0x1e, 0x7}, @restrict={0xf}, @volatile={0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x2ca8}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0x7f}}, @func={0x3, 0x0, 0x0, 0xc, 0x1}, @union={0x4, 0xa, 0x0, 0x5, 0x0, 0x1000, [{0x2, 0x5, 0xfffeffff}, {0xa, 0x5, 0x80000000}, {0x0, 0x2, 0x5}, {0x5, 0x4, 0x7}, {0x4, 0x2, 0x400}, {0xb, 0x3b2, 0x2}, {0x5, 0x4, 0x5}, {0xe, 0x0, 0x8}, {0x4, 0x5, 0x42e}, {0x9, 0x1, 0x5}]}, @enum={0x5, 0x4, 0x0, 0x6, 0x4, [{0x5, 0x1f}, {0x10, 0x10001}, {0x8, 0x1}, {0x8}]}]}, {0x0, [0x5f]}}, &(0x7f00000002c0)=""/52, 0x12f, 0x34, 0x0, 0xfffffffd}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000000c0)='GPL\x00', 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, r3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000007b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 443.882612][T10918] syz-executor.3[10918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 06:15:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYRESHEX=r1], 0x7) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000440), 0x6e, &(0x7f00000007c0), 0x0, &(0x7f0000002000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x1) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={0x0, 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x25, &(0x7f00000019c0)=ANY=[@ANYBLOB="1800800001242602a0f0340de88aa3620100fcfe", @ANYRES32=r4, @ANYBLOB="0000004b02000000b7020000f6ff0000b7030000000000008500000093000000bf090000000000000018120000ca6a988b5ec5ebdfd0ff68aa35bf17cd34970a17103a34979ceb01a60632e20375a299f12d293968042fa9c3e6a2fa3606a8", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800008e0e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018150000", @ANYBLOB="0000000000000000dd223000fcffffff85100000fdffffff186000000d"], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f00000008c0)=[r4, 0xffffffffffffffff, r1]}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xbb74, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001940)={r0, 0x58, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001980)={r5, 0x0, 0x14}, 0xc) recvmsg$unix(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001600)=""/33, 0x21}, {&(0x7f0000001640)=""/196, 0xc4}], 0x2, &(0x7f0000001780)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x12141) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001c80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x4}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001540)=@o_path={&(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, 0x4000, r8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0x0, 0x5, 0x10}, 0x1a) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r9, &(0x7f0000000980)=ANY=[@ANYRESHEX], 0x7) write$cgroup_int(r10, &(0x7f0000000200), 0x43400) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x23, &(0x7f0000001d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, {}, {}, [@tail_call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe8e}}, @map_fd={0x18, 0x5}, @jmp={0x5, 0x0, 0xd, 0x2, 0x0, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_idx={0x18, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x16, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x43afd19a}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffff98c}, @jmp={0x5, 0x0, 0x7, 0x4, 0x6, 0x80, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x8, 0xa, 0x50}, @jmp={0x5, 0x1, 0x1, 0x1, 0x4, 0x4, 0x10}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x40, '\x00', r6, 0x0, r2, 0x8, &(0x7f0000000180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[r8, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x2, 0x0, 0xa}, {0x5, 0x2, 0x2, 0xb}, {0x3, 0x1, 0x9, 0x2}], 0x10, 0x7}, 0x90) 06:15:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000002008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:08 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x0, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 444.065901][T10918] syz-executor.3[10918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 06:15:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010028188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:08 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x4, 0xa, &(0x7f0000000780)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4114af44, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xae, &(0x7f0000000800)=""/174, 0x40f00, 0x6, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x6, 0x65, 0x7f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[r0], 0x0, 0x10, 0x4}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000300), &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380), 0x0, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0x3, [@int={0xa, 0x0, 0x0, 0x1, 0x0, 0x54, 0x0, 0x1e, 0x7}, @restrict={0xf}, @volatile={0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x2ca8}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0x7f}}, @func={0x3, 0x0, 0x0, 0xc, 0x1}, @union={0x4, 0xa, 0x0, 0x5, 0x0, 0x1000, [{0x2, 0x5, 0xfffeffff}, {0xa, 0x5, 0x80000000}, {0x0, 0x2, 0x5}, {0x5, 0x4, 0x7}, {0x4, 0x2, 0x400}, {0xb, 0x3b2, 0x2}, {0x5, 0x4, 0x5}, {0xe, 0x0, 0x8}, {0x4, 0x5, 0x42e}, {0x9, 0x1, 0x5}]}, @enum={0x5, 0x4, 0x0, 0x6, 0x4, [{0x5, 0x1f}, {0x10, 0x10001}, {0x8, 0x1}, {0x8}]}]}, {0x0, [0x5f]}}, &(0x7f00000002c0)=""/52, 0x12f, 0x34, 0x0, 0xfffffffd}, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000000c0)='GPL\x00', 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, r3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000003008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:08 executing program 0: bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x4, 0xa, &(0x7f0000000780)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x4114af44, 0x0, 0x0, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}], &(0x7f0000000300)='syzkaller\x00', 0x0, 0xae, &(0x7f0000000800)=""/174, 0x40f00, 0x6, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x6, 0x65, 0x7f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[r0], 0x0, 0x10, 0x4}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000140)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000300), &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380), 0x0, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x114, 0x114, 0x3, [@int={0xa, 0x0, 0x0, 0x1, 0x0, 0x54, 0x0, 0x1e, 0x7}, @restrict={0xf}, @volatile={0xc}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x4, 0x2ca8}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0x7f}}, @func={0x3, 0x0, 0x0, 0xc, 0x1}, @union={0x4, 0xa, 0x0, 0x5, 0x0, 0x1000, [{0x2, 0x5, 0xfffeffff}, {0xa, 0x5, 0x80000000}, {0x0, 0x2, 0x5}, {0x5, 0x4, 0x7}, {0x4, 0x2, 0x400}, {0xb, 0x3b2, 0x2}, {0x5, 0x4, 0x5}, {0xe, 0x0, 0x8}, {0x4, 0x5, 0x42e}, {0x9, 0x1, 0x5}]}, @enum={0x5, 0x4, 0x0, 0x6, 0x4, [{0x5, 0x1f}, {0x10, 0x10001}, {0x8, 0x1}, {0x8}]}]}, {0x0, [0x5f]}}, &(0x7f00000002c0)=""/52, 0x12f, 0x34, 0x0, 0xfffffffd}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000000c0)='GPL\x00', 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, r3}, 0x90) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f00000000c0)='GPL\x00', 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, r3}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:08 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010038188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:08 executing program 3: bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000024000000850000002a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000000000008500000024000000850000002a00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 06:15:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000004008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 444.232553][T10918] syz-executor.3[10918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.663456][ T28] audit: type=1800 audit(1705731309.019:15): pid=10949 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=1968 res=0 errno=0 06:15:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0xffffff01, 0x0, 0xffffffffffffffff, 0xaa4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r3, &(0x7f00000001c0)="4796544c2fbef0c0c9c17f24e0c525d0e0716f5b34218b2a0eb84681cb4fa74e1f392c4bf6432a8f19adbc91ebc1"}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd9, 0xd9, 0x3, [@const={0x2}, @volatile={0x8, 0x0, 0x0, 0x9, 0x1}, @restrict={0x7, 0x0, 0x0, 0xb, 0x5}, @fwd={0x7}, @datasec={0x6, 0x8, 0x0, 0xf, 0x1, [{0x4, 0xff, 0x7}, {0x2, 0x7f, 0x1}, {0x4, 0xfffffffe, 0x4}, {0x3, 0x1ff, 0x2}, {0x1, 0x1}, {0x4, 0x3ff80, 0x5}, {0x2, 0x1000, 0x9}, {0x3, 0x7, 0xa4}], '0'}, @typedef={0xf, 0x0, 0x0, 0x8, 0x5}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x75, 0x0, 0x4a}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x1d, 0x3}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x4c, 0x0, 0x76, 0x2}]}, {0x0, [0x61]}}, &(0x7f0000000900)=""/36, 0xf7, 0x24, 0x1, 0x5bb}, 0x20) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x6, 0x8001, 0x10000, 0x2, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x3, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000ac0), &(0x7f0000000b00)=r0}, 0x20) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)=@generic={&(0x7f0000000b80)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000c00), &(0x7f0000000c40)=r0}, 0x20) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='memory.stat\x00', 0x100002, 0x0) r12 = getpid() perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0xfe, 0x6f, 0xff, 0x0, 0x3f, 0x20004, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x1, @perf_config_ext={0x8000000000000000, 0x4}, 0x10081, 0x7fffffff, 0x48, 0x4, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x7}, r12, 0xf, r11, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x26, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@exit, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0xc2, &(0x7f00000004c0)=""/194, 0x41100, 0x4, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000980)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x5, 0x4, 0xffffffff, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000cc0)=[r6, r7, r8, r9, r10, r11], &(0x7f0000000d00)=[{0x5, 0x5, 0x9}, {0x4, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x3}], 0x10, 0x4}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffffffd) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010048188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:09 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYRESHEX=r1], 0x7) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000440), 0x6e, &(0x7f00000007c0), 0x0, &(0x7f0000002000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x1) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) (async) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={0x0, 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x25, &(0x7f00000019c0)=ANY=[@ANYBLOB="1800800001242602a0f0340de88aa3620100fcfe", @ANYRES32=r4, @ANYBLOB="0000004b02000000b7020000f6ff0000b7030000000000008500000093000000bf090000000000000018120000ca6a988b5ec5ebdfd0ff68aa35bf17cd34970a17103a34979ceb01a60632e20375a299f12d293968042fa9c3e6a2fa3606a8", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800008e0e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018150000", @ANYBLOB="0000000000000000dd223000fcffffff85100000fdffffff186000000d"], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f00000008c0)=[r4, 0xffffffffffffffff, r1]}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xbb74, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001940)={r0, 0x58, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001980)={r5, 0x0, 0x14}, 0xc) (async) recvmsg$unix(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001600)=""/33, 0x21}, {&(0x7f0000001640)=""/196, 0xc4}], 0x2, &(0x7f0000001780)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x12141) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001c80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x4}, 0x48) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001540)=@o_path={&(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, 0x4000, r8}, 0x18) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0x0, 0x5, 0x10}, 0x1a) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r9, &(0x7f0000000980)=ANY=[@ANYRESHEX], 0x7) (async) write$cgroup_int(r10, &(0x7f0000000200), 0x43400) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x23, &(0x7f0000001d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, {}, {}, [@tail_call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe8e}}, @map_fd={0x18, 0x5}, @jmp={0x5, 0x0, 0xd, 0x2, 0x0, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_idx={0x18, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x16, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x43afd19a}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffff98c}, @jmp={0x5, 0x0, 0x7, 0x4, 0x6, 0x80, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x8, 0xa, 0x50}, @jmp={0x5, 0x1, 0x1, 0x1, 0x4, 0x4, 0x10}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x40, '\x00', r6, 0x0, r2, 0x8, &(0x7f0000000180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[r8, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x2, 0x0, 0xa}, {0x5, 0x2, 0x2, 0xb}, {0x3, 0x1, 0x9, 0x2}], 0x10, 0x7}, 0x90) 06:15:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000005008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010058188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0xffffff01, 0x0, 0xffffffffffffffff, 0xaa4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r3, &(0x7f00000001c0)="4796544c2fbef0c0c9c17f24e0c525d0e0716f5b34218b2a0eb84681cb4fa74e1f392c4bf6432a8f19adbc91ebc1"}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd9, 0xd9, 0x3, [@const={0x2}, @volatile={0x8, 0x0, 0x0, 0x9, 0x1}, @restrict={0x7, 0x0, 0x0, 0xb, 0x5}, @fwd={0x7}, @datasec={0x6, 0x8, 0x0, 0xf, 0x1, [{0x4, 0xff, 0x7}, {0x2, 0x7f, 0x1}, {0x4, 0xfffffffe, 0x4}, {0x3, 0x1ff, 0x2}, {0x1, 0x1}, {0x4, 0x3ff80, 0x5}, {0x2, 0x1000, 0x9}, {0x3, 0x7, 0xa4}], '0'}, @typedef={0xf, 0x0, 0x0, 0x8, 0x5}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x75, 0x0, 0x4a}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x1d, 0x3}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x4c, 0x0, 0x76, 0x2}]}, {0x0, [0x61]}}, &(0x7f0000000900)=""/36, 0xf7, 0x24, 0x1, 0x5bb}, 0x20) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0xffffffffffffffff, 0x8, 0x8}, 0xc) (async, rerun: 64) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x6, 0x8001, 0x10000, 0x2, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x3, 0x1}, 0x48) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000ac0), &(0x7f0000000b00)=r0}, 0x20) (async, rerun: 64) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)=@generic={&(0x7f0000000b80)='./file0\x00', 0x0, 0x8}, 0x18) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000c00), &(0x7f0000000c40)=r0}, 0x20) (async, rerun: 64) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='memory.stat\x00', 0x100002, 0x0) (async, rerun: 64) r12 = getpid() perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0xfe, 0x6f, 0xff, 0x0, 0x3f, 0x20004, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x1, @perf_config_ext={0x8000000000000000, 0x4}, 0x10081, 0x7fffffff, 0x48, 0x4, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x7}, r12, 0xf, r11, 0x0) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x26, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@exit, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0xc2, &(0x7f00000004c0)=""/194, 0x41100, 0x4, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000980)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x5, 0x4, 0xffffffff, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000cc0)=[r6, r7, r8, r9, r10, r11], &(0x7f0000000d00)=[{0x5, 0x5, 0x9}, {0x4, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x3}], 0x10, 0x4}, 0x90) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffffffd) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 445.054147][T10975] syz-executor.3[10975] is installing a program with bpf_probe_write_user helper that may corrupt user memory! 06:15:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010068188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000006008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYRESHEX=r1], 0x7) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000440), 0x6e, &(0x7f00000007c0), 0x0, &(0x7f0000002000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x1) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={0x0, 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x25, &(0x7f00000019c0)=ANY=[@ANYBLOB="1800800001242602a0f0340de88aa3620100fcfe", @ANYRES32=r4, @ANYBLOB="0000004b02000000b7020000f6ff0000b7030000000000008500000093000000bf090000000000000018120000ca6a988b5ec5ebdfd0ff68aa35bf17cd34970a17103a34979ceb01a60632e20375a299f12d293968042fa9c3e6a2fa3606a8", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800008e0e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018150000", @ANYBLOB="0000000000000000dd223000fcffffff85100000fdffffff186000000d"], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f00000008c0)=[r4, 0xffffffffffffffff, r1]}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xbb74, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001940)={r0, 0x58, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001980)={r5, 0x0, 0x14}, 0xc) recvmsg$unix(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001600)=""/33, 0x21}, {&(0x7f0000001640)=""/196, 0xc4}], 0x2, &(0x7f0000001780)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x12141) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001c80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x4}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001540)=@o_path={&(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, 0x4000, r8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0x0, 0x5, 0x10}, 0x1a) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r9, &(0x7f0000000980)=ANY=[@ANYRESHEX], 0x7) write$cgroup_int(r10, &(0x7f0000000200), 0x43400) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x23, &(0x7f0000001d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, {}, {}, [@tail_call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe8e}}, @map_fd={0x18, 0x5}, @jmp={0x5, 0x0, 0xd, 0x2, 0x0, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_idx={0x18, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x16, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x43afd19a}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffff98c}, @jmp={0x5, 0x0, 0x7, 0x4, 0x6, 0x80, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x8, 0xa, 0x50}, @jmp={0x5, 0x1, 0x1, 0x1, 0x4, 0x4, 0x10}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x40, '\x00', r6, 0x0, r2, 0x8, &(0x7f0000000180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[r8, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x2, 0x0, 0xa}, {0x5, 0x2, 0x2, 0xb}, {0x3, 0x1, 0x9, 0x2}], 0x10, 0x7}, 0x90) 06:15:09 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYRESHEX=r1], 0x7) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000440), 0x6e, &(0x7f00000007c0), 0x0, &(0x7f0000002000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x1) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000440), 0x6e, &(0x7f00000007c0), 0x0, &(0x7f0000002000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x1) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={0x0, 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x25, &(0x7f00000019c0)=ANY=[@ANYBLOB="1800800001242602a0f0340de88aa3620100fcfe", @ANYRES32=r4, @ANYBLOB="0000004b02000000b7020000f6ff0000b7030000000000008500000093000000bf090000000000000018120000ca6a988b5ec5ebdfd0ff68aa35bf17cd34970a17103a34979ceb01a60632e20375a299f12d293968042fa9c3e6a2fa3606a8", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800008e0e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018150000", @ANYBLOB="0000000000000000dd223000fcffffff85100000fdffffff186000000d"], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f00000008c0)=[r4, 0xffffffffffffffff, r1]}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xbb74, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xbb74, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001940)={r0, 0x58, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001980)={r5, 0x0, 0x14}, 0xc) recvmsg$unix(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001600)=""/33, 0x21}, {&(0x7f0000001640)=""/196, 0xc4}], 0x2, &(0x7f0000001780)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x12141) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001c80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x4}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001540)=@o_path={&(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, 0x4000, r8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0x0, 0x5, 0x10}, 0x1a) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r9, &(0x7f0000000980)=ANY=[@ANYRESHEX], 0x7) write$cgroup_int(r10, &(0x7f0000000200), 0x43400) (async) write$cgroup_int(r10, &(0x7f0000000200), 0x43400) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x23, &(0x7f0000001d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, {}, {}, [@tail_call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe8e}}, @map_fd={0x18, 0x5}, @jmp={0x5, 0x0, 0xd, 0x2, 0x0, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_idx={0x18, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x23, &(0x7f0000001d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, {}, {}, [@tail_call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe8e}}, @map_fd={0x18, 0x5}, @jmp={0x5, 0x0, 0xd, 0x2, 0x0, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_idx={0x18, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x16, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x43afd19a}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffff98c}, @jmp={0x5, 0x0, 0x7, 0x4, 0x6, 0x80, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x8, 0xa, 0x50}, @jmp={0x5, 0x1, 0x1, 0x1, 0x4, 0x4, 0x10}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x40, '\x00', r6, 0x0, r2, 0x8, &(0x7f0000000180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[r8, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x2, 0x0, 0xa}, {0x5, 0x2, 0x2, 0xb}, {0x3, 0x1, 0x9, 0x2}], 0x10, 0x7}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x16, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x43afd19a}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffff98c}, @jmp={0x5, 0x0, 0x7, 0x4, 0x6, 0x80, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x8, 0xa, 0x50}, @jmp={0x5, 0x1, 0x1, 0x1, 0x4, 0x4, 0x10}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x40, '\x00', r6, 0x0, r2, 0x8, &(0x7f0000000180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[r8, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x2, 0x0, 0xa}, {0x5, 0x2, 0x2, 0xb}, {0x3, 0x1, 0x9, 0x2}], 0x10, 0x7}, 0x90) 06:15:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000007008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010078188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:09 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000040)={0x1b, 0x0, 0x0, 0xffffff01, 0x0, 0xffffffffffffffff, 0xaa4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x48) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r3, &(0x7f00000001c0)="4796544c2fbef0c0c9c17f24e0c525d0e0716f5b34218b2a0eb84681cb4fa74e1f392c4bf6432a8f19adbc91ebc1"}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0], 0x0, 0x8, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd9, 0xd9, 0x3, [@const={0x2}, @volatile={0x8, 0x0, 0x0, 0x9, 0x1}, @restrict={0x7, 0x0, 0x0, 0xb, 0x5}, @fwd={0x7}, @datasec={0x6, 0x8, 0x0, 0xf, 0x1, [{0x4, 0xff, 0x7}, {0x2, 0x7f, 0x1}, {0x4, 0xfffffffe, 0x4}, {0x3, 0x1ff, 0x2}, {0x1, 0x1}, {0x4, 0x3ff80, 0x5}, {0x2, 0x1000, 0x9}, {0x3, 0x7, 0xa4}], '0'}, @typedef={0xf, 0x0, 0x0, 0x8, 0x5}, @int={0xe, 0x0, 0x0, 0x1, 0x0, 0x75, 0x0, 0x4a}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x1d, 0x3}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x4c, 0x0, 0x76, 0x2}]}, {0x0, [0x61]}}, &(0x7f0000000900)=""/36, 0xf7, 0x24, 0x1, 0x5bb}, 0x20) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0xffffffffffffffff, 0x8, 0x8}, 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@bloom_filter={0x1e, 0x6, 0x8001, 0x10000, 0x2, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x3, 0x1}, 0x48) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b40)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000ac0), &(0x7f0000000b00)=r0}, 0x20) (async) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000bc0)=@generic={&(0x7f0000000b80)='./file0\x00', 0x0, 0x8}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000c00), &(0x7f0000000c40)=r0}, 0x20) (async) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='memory.stat\x00', 0x100002, 0x0) (async) r12 = getpid() perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x81, 0xfe, 0x6f, 0xff, 0x0, 0x3f, 0x20004, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb, 0x1, @perf_config_ext={0x8000000000000000, 0x4}, 0x10081, 0x7fffffff, 0x48, 0x4, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x7}, r12, 0xf, r11, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x26, &(0x7f0000000380)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x20}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@exit, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000140)='syzkaller\x00', 0x3, 0xc2, &(0x7f00000004c0)=""/194, 0x41100, 0x4, '\x00', r4, 0x0, r5, 0x8, &(0x7f0000000980)={0x9, 0x4}, 0x8, 0x10, &(0x7f00000009c0)={0x5, 0x4, 0xffffffff, 0x7}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000cc0)=[r6, r7, r8, r9, r10, r11], &(0x7f0000000d00)=[{0x5, 0x5, 0x9}, {0x4, 0x4, 0xb, 0x2}, {0x5, 0x4, 0x3}], 0x10, 0x4}, 0x90) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0xfffffffffffffffd) (async) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:09 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x0, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 445.077940][T10976] syz-executor.3[10976] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.549463][ T28] audit: type=1800 audit(1705731309.909:16): pid=10990 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor.5" name="cgroup.controllers" dev="sda1" ino=1959 res=0 errno=0 [ 445.592013][ T1237] ieee802154 phy0 wpan0: encryption failed: -22 [ 445.598434][ T1237] ieee802154 phy1 wpan1: encryption failed: -22 06:15:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000008008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x10, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe6f, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x3, 0x7, 0x7, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='syzkaller\x00', 0x1f, 0xd2, &(0x7f0000000700)=""/210, 0x41100, 0x20, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000b00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000b40)={0x3, 0x0, 0x4a8d, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r1, r1], 0x0, 0x10, 0xcf7}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000004000000"], &(0x7f0000000040)='syzkaller\x00', 0x7019, 0x0, 0x0, 0x41000, 0x7, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x6, 0xa6, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) r4 = syz_clone(0x0, &(0x7f0000000300)="4485cc4a6af09ef3bc2f", 0xa, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="84636596c588663ae2d37da04e6d873b43d75b1858ca72390874696eb4a51643e66663c581d4af882ee972466bd2bbbdb46a8fc8fa70c88fbb499f4f457ec7f618edc2f0f92ba61f983a88a6ef91943470a841aa5cc7b7dae4f1cf96c79fcacf6697382b101070de2993900fcfc9434d4c6310cb6eeade8447def5e8978f87f8d6f136f2590724dd328c662b0ece48287b4f0b3f6c7a147ddecfb01bfd27887190061ad418af6adbfc165648876c4d741e732ceb3636cf9244618ab2948b3a94c6fab2b4315cf0126bc56628f44097cc8153ba1711fe93b0e83d79d6e6dc6f6708977f35a2f70cc39c823ba1c25b000f8905c9dade2cb54d") perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x7, 0x6, 0x0, 0x4, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xffff8001, 0x4, @perf_config_ext={0x7, 0x7}, 0x2, 0x9, 0x80, 0x5, 0x10000, 0x400, 0x9, 0x0, 0x6, 0x0, 0x5}, r4, 0x9, r1, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x9, &(0x7f0000000fc0)=ANY=[@ANYBLOB="181100f78a8609962dd17dab7108b6280f33", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000"], &(0x7f0000000d00)='syzkaller\x00', 0x63460b01, 0x98, &(0x7f0000000d40)=""/152, 0x41100, 0x71, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000e00)={0x5, 0x7, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000c80)=[r1], &(0x7f0000000e80)=[{0x1, 0x3, 0x8, 0x3}, {0x3, 0x4, 0x7, 0x1}, {0x4, 0x3, 0x3, 0x8}, {0x2, 0x3, 0x6, 0xc}, {0x5, 0x2, 0x7, 0x7}, {0x4, 0x4, 0xb, 0x8}, {0x5, 0x1, 0x6, 0xa}], 0x10, 0x80000000}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010088188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:10 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x3, 0x2, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x1, 0x0, 0x6, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0xcaff, 0x1, 0x0, 0x100000001, 0x45a, 0x0, 0x0, 0x9, 0x0, 0x9}, r0, 0x4, r0, 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x80, 0x0, 0x8, 0x9, 0x0, 0x5, 0x8040, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x0, 0xd734}, 0x80534, 0xdcb, 0x2, 0x6, 0xd1ca00000, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0xc, r2, 0x2) write$cgroup_int(r0, &(0x7f0000000580), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0xffe6) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 06:15:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000009008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010098188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:10 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x10, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe6f, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x3, 0x7, 0x7, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='syzkaller\x00', 0x1f, 0xd2, &(0x7f0000000700)=""/210, 0x41100, 0x20, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000b00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000b40)={0x3, 0x0, 0x4a8d, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r1, r1], 0x0, 0x10, 0xcf7}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000004000000"], &(0x7f0000000040)='syzkaller\x00', 0x7019, 0x0, 0x0, 0x41000, 0x7, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x6, 0xa6, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) r4 = syz_clone(0x0, &(0x7f0000000300)="4485cc4a6af09ef3bc2f", 0xa, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="84636596c588663ae2d37da04e6d873b43d75b1858ca72390874696eb4a51643e66663c581d4af882ee972466bd2bbbdb46a8fc8fa70c88fbb499f4f457ec7f618edc2f0f92ba61f983a88a6ef91943470a841aa5cc7b7dae4f1cf96c79fcacf6697382b101070de2993900fcfc9434d4c6310cb6eeade8447def5e8978f87f8d6f136f2590724dd328c662b0ece48287b4f0b3f6c7a147ddecfb01bfd27887190061ad418af6adbfc165648876c4d741e732ceb3636cf9244618ab2948b3a94c6fab2b4315cf0126bc56628f44097cc8153ba1711fe93b0e83d79d6e6dc6f6708977f35a2f70cc39c823ba1c25b000f8905c9dade2cb54d") perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x7, 0x6, 0x0, 0x4, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xffff8001, 0x4, @perf_config_ext={0x7, 0x7}, 0x2, 0x9, 0x80, 0x5, 0x10000, 0x400, 0x9, 0x0, 0x6, 0x0, 0x5}, r4, 0x9, r1, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x9, &(0x7f0000000fc0)=ANY=[@ANYBLOB="181100f78a8609962dd17dab7108b6280f33", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000"], &(0x7f0000000d00)='syzkaller\x00', 0x63460b01, 0x98, &(0x7f0000000d40)=""/152, 0x41100, 0x71, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000e00)={0x5, 0x7, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000c80)=[r1], &(0x7f0000000e80)=[{0x1, 0x3, 0x8, 0x3}, {0x3, 0x4, 0x7, 0x1}, {0x4, 0x3, 0x3, 0x8}, {0x2, 0x3, 0x6, 0xc}, {0x5, 0x2, 0x7, 0x7}, {0x4, 0x4, 0xb, 0x8}, {0x5, 0x1, 0x6, 0xa}], 0x10, 0x80000000}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000a008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100a8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 446.282888][ T28] audit: type=1800 audit(1705731310.609:17): pid=10998 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=1967 res=0 errno=0 06:15:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:10 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x3, 0x2, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x1, 0x0, 0x6, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0xcaff, 0x1, 0x0, 0x100000001, 0x45a, 0x0, 0x0, 0x9, 0x0, 0x9}, r0, 0x4, r0, 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x80, 0x0, 0x8, 0x9, 0x0, 0x5, 0x8040, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x0, 0xd734}, 0x80534, 0xdcb, 0x2, 0x6, 0xd1ca00000, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0xc, r2, 0x2) write$cgroup_int(r0, &(0x7f0000000580), 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0xffe6) (async) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 06:15:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100c8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000c008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 446.689593][T11043] validate_nla: 32 callbacks suppressed [ 446.689616][T11043] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100e8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:11 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYRESHEX=r1], 0x7) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000440), 0x6e, &(0x7f00000007c0), 0x0, &(0x7f0000002000)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}, 0x1) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000006c0)=@o_path={0x0, 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x25, &(0x7f00000019c0)=ANY=[@ANYBLOB="1800800001242602a0f0340de88aa3620100fcfe", @ANYRES32=r4, @ANYBLOB="0000004b02000000b7020000f6ff0000b7030000000000008500000093000000bf090000000000000018120000ca6a988b5ec5ebdfd0ff68aa35bf17cd34970a17103a34979ceb01a60632e20375a299f12d293968042fa9c3e6a2fa3606a8", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800008e0e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018150000", @ANYBLOB="0000000000000000dd223000fcffffff85100000fdffffff186000000d"], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, r3, 0x0, &(0x7f00000008c0)=[r4, 0xffffffffffffffff, r1]}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xbb74, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001940)={r0, 0x58, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001980)={r5, 0x0, 0x14}, 0xc) recvmsg$unix(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001600)=""/33, 0x21}, {&(0x7f0000001640)=""/196, 0xc4}], 0x2, &(0x7f0000001780)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x12141) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001c80)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x4}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001540)=@o_path={&(0x7f0000001340)='./file0\x00', 0xffffffffffffffff, 0x4000, r8}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001300)={0xffffffffffffffff, 0x0, 0x0}, 0x10) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0x0, 0x5, 0x10}, 0x1a) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r9, &(0x7f0000000980)=ANY=[@ANYRESHEX], 0x7) write$cgroup_int(r10, &(0x7f0000000200), 0x43400) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x23, &(0x7f0000001d00)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}, {}, {}, [@tail_call, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xe8e}}, @map_fd={0x18, 0x5}, @jmp={0x5, 0x0, 0xd, 0x2, 0x0, 0x30}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @map_idx={0x18, 0x2}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}}}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0x2f, &(0x7f0000000740)=""/47, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000880)={0x3, 0xe, 0x950, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x16, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x43afd19a}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0xfffff98c}, @jmp={0x5, 0x0, 0x7, 0x4, 0x6, 0x80, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0xb, 0x8, 0xa, 0x50}, @jmp={0x5, 0x1, 0x1, 0x1, 0x4, 0x4, 0x10}, @map_fd={0x18, 0xb, 0x1, 0x0, r7}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x40, '\x00', r6, 0x0, r2, 0x8, &(0x7f0000000180)={0x8, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[r8, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x2, 0x0, 0xa}, {0x5, 0x2, 0x2, 0xb}, {0x3, 0x1, 0x9, 0x2}], 0x10, 0x7}, 0x90) [ 446.815985][T11047] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000d008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:11 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000800)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x9, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000008c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000900), &(0x7f0000000940), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000980)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0x10, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xe6f, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@generic={0x9, 0x3, 0x7, 0x7, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='syzkaller\x00', 0x1f, 0xd2, &(0x7f0000000700)=""/210, 0x41100, 0x20, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000b00)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000b40)={0x3, 0x0, 0x4a8d, 0x400}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[r1, r1], 0x0, 0x10, 0xcf7}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000004000000"], &(0x7f0000000040)='syzkaller\x00', 0x7019, 0x0, 0x0, 0x41000, 0x7, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x5, 0x6, 0xa6, 0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x90) r4 = syz_clone(0x0, &(0x7f0000000300)="4485cc4a6af09ef3bc2f", 0xa, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)="84636596c588663ae2d37da04e6d873b43d75b1858ca72390874696eb4a51643e66663c581d4af882ee972466bd2bbbdb46a8fc8fa70c88fbb499f4f457ec7f618edc2f0f92ba61f983a88a6ef91943470a841aa5cc7b7dae4f1cf96c79fcacf6697382b101070de2993900fcfc9434d4c6310cb6eeade8447def5e8978f87f8d6f136f2590724dd328c662b0ece48287b4f0b3f6c7a147ddecfb01bfd27887190061ad418af6adbfc165648876c4d741e732ceb3636cf9244618ab2948b3a94c6fab2b4315cf0126bc56628f44097cc8153ba1711fe93b0e83d79d6e6dc6f6708977f35a2f70cc39c823ba1c25b000f8905c9dade2cb54d") perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x7, 0x6, 0x0, 0x4, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xffff8001, 0x4, @perf_config_ext={0x7, 0x7}, 0x2, 0x9, 0x80, 0x5, 0x10000, 0x400, 0x9, 0x0, 0x6, 0x0, 0x5}, r4, 0x9, r1, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f00)={0x11, 0x9, &(0x7f0000000fc0)=ANY=[@ANYBLOB="181100f78a8609962dd17dab7108b6280f33", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000050000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000"], &(0x7f0000000d00)='syzkaller\x00', 0x63460b01, 0x98, &(0x7f0000000d40)=""/152, 0x41100, 0x71, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000e00)={0x5, 0x7, 0x3, 0x1}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000c80)=[r1], &(0x7f0000000e80)=[{0x1, 0x3, 0x8, 0x3}, {0x3, 0x4, 0x7, 0x1}, {0x4, 0x3, 0x3, 0x8}, {0x2, 0x3, 0x6, 0xc}, {0x5, 0x2, 0x7, 0x7}, {0x4, 0x4, 0xb, 0x8}, {0x5, 0x1, 0x6, 0xa}], 0x10, 0x80000000}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x3, 0x2, 0x0, 0x0, 0x3c43, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}, 0x1, 0x0, 0x6, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0xcaff, 0x1, 0x0, 0x100000001, 0x45a, 0x0, 0x0, 0x9, 0x0, 0x9}, r0, 0x4, r0, 0x4) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x80, 0x0, 0x8, 0x9, 0x0, 0x5, 0x8040, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x0, 0xd734}, 0x80534, 0xdcb, 0x2, 0x6, 0xd1ca00000, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0xc, r2, 0x2) write$cgroup_int(r0, &(0x7f0000000580), 0x12) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, &(0x7f0000000040)=ANY=[], 0xffe6) (async) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[], 0x1b) (async) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) [ 446.989870][T11050] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 447.027963][T11053] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010108188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000e008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 447.276356][T11058] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 447.316328][T11061] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000000f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010488188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:11 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r0, &(0x7f0000000580), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0xffe6) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2b63707561636374202d64657669636573202d68756765746c62202b726c696d697420ff0365745f7072696f20"], 0x2d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4ab}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) [ 447.626169][T11075] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 447.669479][T11074] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000104c8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010608188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 447.890217][T11083] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:12 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:12 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000726fcfdb677a24000000000000000000000000850000000e00000095000000000000009e7c73c7d5daa8505a46b4b5ceb3f400000000da8ab197dbe05ba068c66a7e0ba99f4aa0b2541cc5da9c9f5d4e3c5b99016df895cfed7ce48c62b4a6c0a288aa6a4640e2ee80278df3044c0e2636c6f2b6481ac430bfeceefd8a9865bf50ce57cd7b3c3412247a6e090618eb526a96a227a21b1911954d2dade4d05ac27aca"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 447.944204][T11085] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010688188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000012008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:12 executing program 3: r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000040)='FREEZING\x00', 0x9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) bpf$LINK_DETACH(0x22, &(0x7f0000000080), 0x4) openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002840)={0x6, 0x4, &(0x7f0000002740)=ANY=[@ANYBLOB="18000000000000000000000000000000870000000000003f0000000000000000"], &(0x7f0000002780)='syzkaller\x00', 0x6}, 0x90) 06:15:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000002f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:12 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async, rerun: 64) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) (async) write$cgroup_int(r0, &(0x7f0000000580), 0x12) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0xffe6) (async) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0x1b) (async) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2b63707561636374202d64657669636573202d68756765746c62202b726c696d697420ff0365745f7072696f20"], 0x2d) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) (rerun: 32) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4ab}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async, rerun: 64) openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) (async, rerun: 64) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 06:15:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000106c8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:12 executing program 3: r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000040)='FREEZING\x00', 0x9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000080), 0x4) (async) openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002840)={0x6, 0x4, &(0x7f0000002740)=ANY=[@ANYBLOB="18000000000000000000000000000000870000000000003f0000000000000000"], &(0x7f0000002780)='syzkaller\x00', 0x6}, 0x90) 06:15:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e0000007b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010748188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000540)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) write$cgroup_int(r0, &(0x7f0000000580), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0xffe6) (async) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[], 0x1b) (async) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="2b63707561636374202d64657669636573202d68756765746c62202b726c696d697420ff0365745f7072696f20"], 0x2d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4ab}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 06:15:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000107a8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010028188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188020f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010038188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 3: r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000040)='FREEZING\x00', 0x9) (async, rerun: 32) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) (rerun: 32) openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000080), 0x4) (async) openat$cgroup_ro(r1, &(0x7f0000000140)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002840)={0x6, 0x4, &(0x7f0000002740)=ANY=[@ANYBLOB="18000000000000000000000000000000870000000000003f0000000000000000"], &(0x7f0000002780)='syzkaller\x00', 0x6}, 0x90) 06:15:13 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000726fcfdb677a24000000000000000000000000850000000e00000095000000000000009e7c73c7d5daa8505a46b4b5ceb3f400000000da8ab197dbe05ba068c66a7e0ba99f4aa0b2541cc5da9c9f5d4e3c5b99016df895cfed7ce48c62b4a6c0a288aa6a4640e2ee80278df3044c0e2636c6f2b6481ac430bfeceefd8a9865bf50ce57cd7b3c3412247a6e090618eb526a96a227a21b1911954d2dade4d05ac27aca"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:13 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010048188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188030f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x3, 0x40, 0x3, 0x0, 0x6, 0x2098, 0x1a, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x0, @perf_config_ext={0x62d765b4, 0xaae}, 0x4, 0x80, 0x9, 0x6, 0x9, 0x2, 0x1f, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0xa, r0, 0x2) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1]}, 0x90) 06:15:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010058188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188050f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x3, 0x40, 0x3, 0x0, 0x6, 0x2098, 0x1a, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x0, @perf_config_ext={0x62d765b4, 0xaae}, 0x4, 0x80, 0x9, 0x6, 0x9, 0x2, 0x1f, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0xa, r0, 0x2) (async, rerun: 32) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1]}, 0x90) 06:15:13 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000d40)={0x0, 0x80, 0x0, 0x8, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x401}, 0x1, 0x7, 0x0, 0x2, 0x1, 0x9, 0xe033, 0x0, 0x1, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r1 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/74, 0x4a}, {&(0x7f0000000200)=""/237, 0xed}, {&(0x7f0000000080)=""/147, 0x93}], 0x3, &(0x7f0000000380)=""/166, 0xa6}, 0x40012120) recvmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) gettid() r2 = perf_event_open$cgroup(&(0x7f0000000980)={0x0, 0x80, 0x0, 0x8, 0x0, 0x3, 0x0, 0xf64, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x29, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086607, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000f40)=ANY=[@ANYBLOB="1c0000005e000763601acd9d3732fbb7c15b831dff9e443bc3f76c47a0671133747f5d6fd15606357776000000009b77dd2ef9698d98d081fc41f7984a"], 0xfe33) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x2f, 0x28, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000fc0)={@cgroup, 0xffffffffffffffff, 0x0, 0x10}, 0x20) bpf$BPF_PROG_ATTACH(0x8, 0xfffffffffffffffd, 0x0) 06:15:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010068188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188060f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000726fcfdb677a24000000000000000000000000850000000e00000095000000000000009e7c73c7d5daa8505a46b4b5ceb3f400000000da8ab197dbe05ba068c66a7e0ba99f4aa0b2541cc5da9c9f5d4e3c5b99016df895cfed7ce48c62b4a6c0a288aa6a4640e2ee80278df3044c0e2636c6f2b6481ac430bfeceefd8a9865bf50ce57cd7b3c3412247a6e090618eb526a96a227a21b1911954d2dade4d05ac27aca"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010078188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188070f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x4, 0x3, 0x40, 0x3, 0x0, 0x6, 0x2098, 0x1a, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x0, @perf_config_ext={0x62d765b4, 0xaae}, 0x4, 0x80, 0x9, 0x6, 0x9, 0x2, 0x1f, 0x0, 0x6, 0x0, 0x7}, 0xffffffffffffffff, 0xa, r0, 0x2) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[r1]}, 0x90) 06:15:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188080f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000d40)={0x0, 0x80, 0x0, 0x8, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x401}, 0x1, 0x7, 0x0, 0x2, 0x1, 0x9, 0xe033, 0x0, 0x1, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') r1 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/74, 0x4a}, {&(0x7f0000000200)=""/237, 0xed}, {&(0x7f0000000080)=""/147, 0x93}], 0x3, &(0x7f0000000380)=""/166, 0xa6}, 0x40012120) recvmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) gettid() r2 = perf_event_open$cgroup(&(0x7f0000000980)={0x0, 0x80, 0x0, 0x8, 0x0, 0x3, 0x0, 0xf64, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x29, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086607, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000f40)=ANY=[@ANYBLOB="1c0000005e000763601acd9d3732fbb7c15b831dff9e443bc3f76c47a0671133747f5d6fd15606357776000000009b77dd2ef9698d98d081fc41f7984a"], 0xfe33) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x2f, 0x28, 0x0, @prog_id}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000fc0)={@cgroup, 0xffffffffffffffff, 0x0, 0x10}, 0x20) bpf$BPF_PROG_ATTACH(0x8, 0xfffffffffffffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$kcm(0xa, 0x2, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000d40)={0x0, 0x80, 0x0, 0x8, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x401}, 0x1, 0x7, 0x0, 0x2, 0x1, 0x9, 0xe033, 0x0, 0x1, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async) socket$kcm(0x10, 0x400000002, 0x0) (async) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/74, 0x4a}, {&(0x7f0000000200)=""/237, 0xed}, {&(0x7f0000000080)=""/147, 0x93}], 0x3, &(0x7f0000000380)=""/166, 0xa6}, 0x40012120) (async) recvmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) (async) gettid() (async) perf_event_open$cgroup(&(0x7f0000000980)={0x0, 0x80, 0x0, 0x8, 0x0, 0x3, 0x0, 0xf64, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x29, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086607, 0x0) (async) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000f40)=ANY=[@ANYBLOB="1c0000005e000763601acd9d3732fbb7c15b831dff9e443bc3f76c47a0671133747f5d6fd15606357776000000009b77dd2ef9698d98d081fc41f7984a"], 0xfe33) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x2f, 0x28, 0x0, @prog_id}, 0x20) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000fc0)={@cgroup, 0xffffffffffffffff, 0x0, 0x10}, 0x20) (async) bpf$BPF_PROG_ATTACH(0x8, 0xfffffffffffffffd, 0x0) (async) 06:15:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010088188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1267) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000200), 0x6800}, {0x0}], 0x3, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast1}}}, @ip_retopts={{0x10}}], 0x30}, 0x0) 06:15:14 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188090f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010098188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = perf_event_open(&(0x7f0000000ec0)={0x1, 0x80, 0x6, 0x25, 0x6, 0x6, 0x0, 0x2, 0x1000, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xae0f, 0x4, @perf_bp={&(0x7f0000000e80), 0xe}, 0x1000, 0x7f, 0x4, 0x4, 0x2, 0x9, 0x6, 0x0, 0x4, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000f40)=0xfff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x18, 0x2d, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @generic={0x20, 0x0, 0x2, 0x5, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @ldst={0x3, 0x0, 0x3, 0x5, 0x7, 0x20, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @generic={0x2, 0x6, 0x0, 0x7, 0xfffffff9}]}, &(0x7f0000000000)='GPL\x00', 0x80000000, 0x9a, &(0x7f0000000280)=""/154, 0x41100, 0x2, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x0, 0x7fffffff, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r3, r1, r1], 0x0, 0x10, 0x5}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_tracing={0x1a, 0x27, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4aa6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0xc, 0xc, 0x0, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0x80}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9b71}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x33, &(0x7f0000000c00)=""/51, 0x41100, 0x2, '\x00', r4, 0x18, r1, 0x8, &(0x7f0000000c40)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x2fe13, r6, 0x0, &(0x7f0000000c80)=[r1, r1], 0x0, 0x10, 0x19}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x6, 0x1c, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@generic={0x4, 0x6, 0x6, 0x0, 0x620}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x1, 0x3, 0x6, 0xa, 0x8, 0x4, 0x1}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000009c0)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41000, 0x40, '\x00', r4, 0x7, r3, 0x8, &(0x7f0000000a00)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x3, 0x7, 0x1ff}, 0x10, r5, r8, 0x3, 0x0, &(0x7f0000000d80)=[{0x5, 0x2, 0x10, 0x1}, {0x3, 0x1, 0xc, 0x6}, {0x0, 0x1, 0x8, 0x2}], 0x10, 0x1}, 0x90) 06:15:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100081880a0f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100a8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188100f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:14 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$kcm(0xa, 0x2, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000d40)={0x0, 0x80, 0x0, 0x8, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x401}, 0x1, 0x7, 0x0, 0x2, 0x1, 0x9, 0xe033, 0x0, 0x1, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async) r1 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/74, 0x4a}, {&(0x7f0000000200)=""/237, 0xed}, {&(0x7f0000000080)=""/147, 0x93}], 0x3, &(0x7f0000000380)=""/166, 0xa6}, 0x40012120) (async) recvmsg$kcm(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) gettid() (async) r2 = perf_event_open$cgroup(&(0x7f0000000980)={0x0, 0x80, 0x0, 0x8, 0x0, 0x3, 0x0, 0xf64, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x29, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086607, 0x0) (async, rerun: 32) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) write$cgroup_subtree(r1, &(0x7f0000000f40)=ANY=[@ANYBLOB="1c0000005e000763601acd9d3732fbb7c15b831dff9e443bc3f76c47a0671133747f5d6fd15606357776000000009b77dd2ef9698d98d081fc41f7984a"], 0xfe33) (async) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000140)={@map=0x1, 0xffffffffffffffff, 0x2f, 0x28, 0x0, @prog_id}, 0x20) (async, rerun: 32) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000fc0)={@cgroup, 0xffffffffffffffff, 0x0, 0x10}, 0x20) (async, rerun: 32) bpf$BPF_PROG_ATTACH(0x8, 0xfffffffffffffffd, 0x0) 06:15:14 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1267) (async) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000200), 0x6800}, {0x0}], 0x3, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast1}}}, @ip_retopts={{0x10}}], 0x30}, 0x0) 06:15:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100c8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040246ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100e8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:15 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1267) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1267) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000200), 0x6800}, {0x0}], 0x3, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast1}}}, @ip_retopts={{0x10}}], 0x30}, 0x0) (async) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000200), 0x6800}, {0x0}], 0x3, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast1}}}, @ip_retopts={{0x10}}], 0x30}, 0x0) 06:15:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040346ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040446ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010108188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 451.827201][T11223] validate_nla: 40 callbacks suppressed [ 451.827222][T11223] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = perf_event_open(&(0x7f0000000ec0)={0x1, 0x80, 0x6, 0x25, 0x6, 0x6, 0x0, 0x2, 0x1000, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xae0f, 0x4, @perf_bp={&(0x7f0000000e80), 0xe}, 0x1000, 0x7f, 0x4, 0x4, 0x2, 0x9, 0x6, 0x0, 0x4, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000f40)=0xfff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x18, 0x2d, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @generic={0x20, 0x0, 0x2, 0x5, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @ldst={0x3, 0x0, 0x3, 0x5, 0x7, 0x20, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @generic={0x2, 0x6, 0x0, 0x7, 0xfffffff9}]}, &(0x7f0000000000)='GPL\x00', 0x80000000, 0x9a, &(0x7f0000000280)=""/154, 0x41100, 0x2, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x0, 0x7fffffff, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r3, r1, r1], 0x0, 0x10, 0x5}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) (async) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_tracing={0x1a, 0x27, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4aa6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0xc, 0xc, 0x0, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0x80}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9b71}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x33, &(0x7f0000000c00)=""/51, 0x41100, 0x2, '\x00', r4, 0x18, r1, 0x8, &(0x7f0000000c40)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x2fe13, r6, 0x0, &(0x7f0000000c80)=[r1, r1], 0x0, 0x10, 0x19}, 0x90) (async) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_tracing={0x1a, 0x27, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4aa6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0xc, 0xc, 0x0, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0x80}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9b71}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x33, &(0x7f0000000c00)=""/51, 0x41100, 0x2, '\x00', r4, 0x18, r1, 0x8, &(0x7f0000000c40)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x2fe13, r6, 0x0, &(0x7f0000000c80)=[r1, r1], 0x0, 0x10, 0x19}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x6, 0x1c, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@generic={0x4, 0x6, 0x6, 0x0, 0x620}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x1, 0x3, 0x6, 0xa, 0x8, 0x4, 0x1}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000009c0)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41000, 0x40, '\x00', r4, 0x7, r3, 0x8, &(0x7f0000000a00)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x3, 0x7, 0x1ff}, 0x10, r5, r8, 0x3, 0x0, &(0x7f0000000d80)=[{0x5, 0x2, 0x10, 0x1}, {0x3, 0x1, 0xc, 0x6}, {0x0, 0x1, 0x8, 0x2}], 0x10, 0x1}, 0x90) [ 451.947744][T11226] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:16 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 452.004527][T11223] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:16 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, r0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1267) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000200), 0x6800}, {0x0}], 0x3, &(0x7f0000000040)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @multicast1}}}, @ip_retopts={{0x10}}], 0x30}, 0x0) 06:15:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010148188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040546ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:16 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 452.336774][T11232] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 452.443770][T11237] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 452.504661][T11240] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000103c8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040646ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:17 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r2 = perf_event_open(&(0x7f0000000ec0)={0x1, 0x80, 0x6, 0x25, 0x6, 0x6, 0x0, 0x2, 0x1000, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xae0f, 0x4, @perf_bp={&(0x7f0000000e80), 0xe}, 0x1000, 0x7f, 0x4, 0x4, 0x2, 0x9, 0x6, 0x0, 0x4, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000f40)=0xfff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x18, 0x2d, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @generic={0x20, 0x0, 0x2, 0x5, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @ldst={0x3, 0x0, 0x3, 0x5, 0x7, 0x20, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @generic={0x2, 0x6, 0x0, 0x7, 0xfffffff9}]}, &(0x7f0000000000)='GPL\x00', 0x80000000, 0x9a, &(0x7f0000000280)=""/154, 0x41100, 0x2, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x0, 0x7fffffff, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r3, r1, r1], 0x0, 0x10, 0x5}, 0x90) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_tracing={0x1a, 0x27, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4aa6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0xc, 0xc, 0x0, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0x80}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9b71}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x33, &(0x7f0000000c00)=""/51, 0x41100, 0x2, '\x00', r4, 0x18, r1, 0x8, &(0x7f0000000c40)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x2fe13, r6, 0x0, &(0x7f0000000c80)=[r1, r1], 0x0, 0x10, 0x19}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x6, 0x1c, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@generic={0x4, 0x6, 0x6, 0x0, 0x620}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x1, 0x3, 0x6, 0xa, 0x8, 0x4, 0x1}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000009c0)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41000, 0x40, '\x00', r4, 0x7, r3, 0x8, &(0x7f0000000a00)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x3, 0x7, 0x1ff}, 0x10, r5, r8, 0x3, 0x0, &(0x7f0000000d80)=[{0x5, 0x2, 0x10, 0x1}, {0x3, 0x1, 0xc, 0x6}, {0x0, 0x1, 0x8, 0x2}], 0x10, 0x1}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) perf_event_open(&(0x7f0000000ec0)={0x1, 0x80, 0x6, 0x25, 0x6, 0x6, 0x0, 0x2, 0x1000, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xae0f, 0x4, @perf_bp={&(0x7f0000000e80), 0xe}, 0x1000, 0x7f, 0x4, 0x4, 0x2, 0x9, 0x6, 0x0, 0x4, 0x0, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000f40)=0xfff) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000500)=[{}], 0x8, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x18, 0x2d, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3ff}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7fff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @generic={0x20, 0x0, 0x2, 0x5, 0x4}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @ldst={0x3, 0x0, 0x3, 0x5, 0x7, 0x20, 0x8}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x2}, @generic={0x2, 0x6, 0x0, 0x7, 0xfffffff9}]}, &(0x7f0000000000)='GPL\x00', 0x80000000, 0x9a, &(0x7f0000000280)=""/154, 0x41100, 0x2, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x0, 0x7fffffff, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r3, r1, r1], 0x0, 0x10, 0x5}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_type(r7, &(0x7f0000000000), 0x248800) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_tracing={0x1a, 0x27, &(0x7f0000000a80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4aa6}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0xc, 0xc, 0x0, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0x80}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9b71}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000bc0)='GPL\x00', 0x0, 0x33, &(0x7f0000000c00)=""/51, 0x41100, 0x2, '\x00', r4, 0x18, r1, 0x8, &(0x7f0000000c40)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x2fe13, r6, 0x0, &(0x7f0000000c80)=[r1, r1], 0x0, 0x10, 0x19}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x6, 0x1c, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@generic={0x4, 0x6, 0x6, 0x0, 0x620}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ldst={0x1, 0x3, 0x6, 0xa, 0x8, 0x4, 0x1}, @map_idx_val={0x18, 0x4, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000009c0)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x41000, 0x40, '\x00', r4, 0x7, r3, 0x8, &(0x7f0000000a00)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x3, 0x3, 0x7, 0x1ff}, 0x10, r5, r8, 0x3, 0x0, &(0x7f0000000d80)=[{0x5, 0x2, 0x10, 0x1}, {0x3, 0x1, 0xc, 0x6}, {0x0, 0x1, 0x8, 0x2}], 0x10, 0x1}, 0x90) (async) [ 452.904792][T11249] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:17 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 452.954937][T11248] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 453.019525][T11250] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010488188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040746ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 453.318396][T11260] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:17 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040846ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000104c8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010608188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040946ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040a46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:18 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x2, 0x8c054, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4800, 0x0, 0xfffffffd, 0x0, 0x0, 0x200, 0x0, 0x0, 0x6, 0x0, 0x10}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.freeze\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) perf_event_open$cgroup(&(0x7f0000000900)={0x3, 0x80, 0x40, 0xdf, 0x0, 0x1, 0x0, 0x8001, 0x80080, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6}, 0xc050, 0x8001, 0x1, 0x9, 0x9, 0xb36, 0x3ab7, 0x0, 0xfffffffe, 0x0, 0x3}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2c0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f00000006c0)) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) getpid() syz_clone(0x2124b200, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffff72, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0xfffffffffffffe58) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x19, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x34100) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x6dd9) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000540)=@o_path={&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r8 = openat$cgroup_ro(r7, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1c, 0x2000b7bb, 0x8, 0x401, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x4, 0xb}, 0xffffffffffffff8b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0x5, &(0x7f0000000a80)=ANY=[@ANYRES32=r5], &(0x7f0000000580)='GPL\x00', 0x8, 0xfe, &(0x7f0000000980)=""/254, 0x40f00, 0x4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x12) 06:15:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x34100) recvmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010688188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000106c8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:18 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040b46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:18 executing program 5: perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0xfffffffffffffffd, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x82342, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1, 0x0, 0x1f0000000000c08e, 0x2000008}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000480)={'macvlan0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x3, 0x0, 0x0, 0xfffffffb}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52c61100, 0x4, @perf_config_ext={0x5e, 0x87}, 0x2040, 0x8005, 0x800, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001840)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x5, 0x10, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfc000000, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}]}, &(0x7f0000000800)='syzkaller\x00', 0x3ff, 0x6a, &(0x7f0000000880)=""/106, 0x41000, 0x1c, '\x00', 0x0, 0xe, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ac0)={0x1, 0x8, 0x400, 0x9}, 0x10, r6, r4, 0x3, &(0x7f0000000b00)=[r1, r4], &(0x7f0000000b40)=[{0x4, 0x4, 0x6, 0x9}, {0x2, 0x1, 0xe, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x100}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) socketpair(0x2c, 0x80000, 0x10000, &(0x7f0000000000)) 06:15:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010748188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040c46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000107a8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:19 executing program 3: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x2, 0x8c054, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4800, 0x0, 0xfffffffd, 0x0, 0x0, 0x200, 0x0, 0x0, 0x6, 0x0, 0x10}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x2, 0x8c054, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4800, 0x0, 0xfffffffd, 0x0, 0x0, 0x200, 0x0, 0x0, 0x6, 0x0, 0x10}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.freeze\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) perf_event_open$cgroup(&(0x7f0000000900)={0x3, 0x80, 0x40, 0xdf, 0x0, 0x1, 0x0, 0x8001, 0x80080, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6}, 0xc050, 0x8001, 0x1, 0x9, 0x9, 0xb36, 0x3ab7, 0x0, 0xfffffffe, 0x0, 0x3}, r1, 0x9, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000900)={0x3, 0x80, 0x40, 0xdf, 0x0, 0x1, 0x0, 0x8001, 0x80080, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6}, 0xc050, 0x8001, 0x1, 0x9, 0x9, 0xb36, 0x3ab7, 0x0, 0xfffffffe, 0x0, 0x3}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2c0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x1ff) (async) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f00000006c0)) (async) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f00000006c0)) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) (async) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) getpid() (async) getpid() syz_clone(0x2124b200, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffff72, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0xfffffffffffffe58) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x19, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) (async) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x34100) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x6dd9) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x6dd9) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000540)=@o_path={&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r8 = openat$cgroup_ro(r7, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1c, 0x2000b7bb, 0x8, 0x401, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x4, 0xb}, 0xffffffffffffff8b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0x5, &(0x7f0000000a80)=ANY=[@ANYRES32=r5], &(0x7f0000000580)='GPL\x00', 0x8, 0xfe, &(0x7f0000000980)=""/254, 0x40f00, 0x4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x12) 06:15:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040d46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:19 executing program 5: perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0xfffffffffffffffd, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) (async) close(r0) close(r1) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) (async) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x82342, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1, 0x0, 0x1f0000000000c08e, 0x2000008}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000480)={'macvlan0\x00'}) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x3, 0x0, 0x0, 0xfffffffb}, 0x48) (async) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52c61100, 0x4, @perf_config_ext={0x5e, 0x87}, 0x2040, 0x8005, 0x800, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001840)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x5, 0x10, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfc000000, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}]}, &(0x7f0000000800)='syzkaller\x00', 0x3ff, 0x6a, &(0x7f0000000880)=""/106, 0x41000, 0x1c, '\x00', 0x0, 0xe, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ac0)={0x1, 0x8, 0x400, 0x9}, 0x10, r6, r4, 0x3, &(0x7f0000000b00)=[r1, r4], &(0x7f0000000b40)=[{0x4, 0x4, 0x6, 0x9}, {0x2, 0x1, 0xe, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x100}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) socketpair(0x2c, 0x80000, 0x10000, &(0x7f0000000000)) 06:15:19 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188020f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x34100) (async) recvmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188030f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:20 executing program 5: perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000001000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0xfffffffffffffffd, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x82342, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1, 0x0, 0x1f0000000000c08e, 0x2000008}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000480)={'macvlan0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x3, 0x0, 0x0, 0xfffffffb}, 0x48) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52c61100, 0x4, @perf_config_ext={0x5e, 0x87}, 0x2040, 0x8005, 0x800, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x20, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001840)=r6, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x5, 0x10, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfc000000, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}]}, &(0x7f0000000800)='syzkaller\x00', 0x3ff, 0x6a, &(0x7f0000000880)=""/106, 0x41000, 0x1c, '\x00', 0x0, 0xe, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ac0)={0x1, 0x8, 0x400, 0x9}, 0x10, r6, r4, 0x3, &(0x7f0000000b00)=[r1, r4], &(0x7f0000000b40)=[{0x4, 0x4, 0x6, 0x9}, {0x2, 0x1, 0xe, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x100}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x5, 0x10, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfc000000, 0x0, 0x0, 0x0, 0x1}, [@map_idx={0x18, 0x8, 0x5, 0x0, 0xc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}]}, &(0x7f0000000800)='syzkaller\x00', 0x3ff, 0x6a, &(0x7f0000000880)=""/106, 0x41000, 0x1c, '\x00', 0x0, 0xe, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ac0)={0x1, 0x8, 0x400, 0x9}, 0x10, r6, r4, 0x3, &(0x7f0000000b00)=[r1, r4], &(0x7f0000000b40)=[{0x4, 0x4, 0x6, 0x9}, {0x2, 0x1, 0xe, 0x5}, {0x3, 0x3, 0xf, 0x3}], 0x10, 0x100}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4004662b, &(0x7f00000005c0)=0x1) socketpair(0x2c, 0x80000, 0x10000, &(0x7f0000000000)) 06:15:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040e46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188050f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:20 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x2, 0x8c054, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4800, 0x0, 0xfffffffd, 0x0, 0x0, 0x200, 0x0, 0x0, 0x6, 0x0, 0x10}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.freeze\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) perf_event_open$cgroup(&(0x7f0000000900)={0x3, 0x80, 0x40, 0xdf, 0x0, 0x1, 0x0, 0x8001, 0x80080, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6}, 0xc050, 0x8001, 0x1, 0x9, 0x9, 0xb36, 0x3ab7, 0x0, 0xfffffffe, 0x0, 0x3}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2c0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x1ff) (async) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f00000006c0)) (async) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) (async) getpid() (async) syz_clone(0x2124b200, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffff72, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0xfffffffffffffe58) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x19, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x34100) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x6dd9) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000540)=@o_path={&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) (async) r8 = openat$cgroup_ro(r7, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1c, 0x2000b7bb, 0x8, 0x401, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x4, 0xb}, 0xffffffffffffff8b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0x5, &(0x7f0000000a80)=ANY=[@ANYRES32=r5], &(0x7f0000000580)='GPL\x00', 0x8, 0xfe, &(0x7f0000000980)=""/254, 0x40f00, 0x4}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x12) 06:15:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188060f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188041046ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188070f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 456.849812][T11354] validate_nla: 30 callbacks suppressed [ 456.849834][T11354] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:21 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)=ANY=[], 0x34100) recvmsg$unix(r0, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 456.904333][T11354] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188041146ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188080f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:21 executing program 5: r0 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x2, 0x8c054, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x4800, 0x0, 0xfffffffd, 0x0, 0x0, 0x200, 0x0, 0x0, 0x6, 0x0, 0x10}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.freeze\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) perf_event_open$cgroup(&(0x7f0000000900)={0x3, 0x80, 0x40, 0xdf, 0x0, 0x1, 0x0, 0x8001, 0x80080, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x6}, 0xc050, 0x8001, 0x1, 0x9, 0x9, 0xb36, 0x3ab7, 0x0, 0xfffffffe, 0x0, 0x3}, r1, 0x9, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2c0}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup(r3, &(0x7f00000001c0)='syz0\x00', 0x1ff) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f00000006c0)) write$cgroup_pid(r4, &(0x7f0000000040), 0x12) getpid() syz_clone(0x2124b200, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffff72, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0xfffffffffffffe58) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x19, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffe56, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) write$cgroup_subtree(r6, &(0x7f0000000040)=ANY=[], 0x34100) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0x6dd9) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000540)=@o_path={&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x4000, r0}, 0x18) r8 = openat$cgroup_ro(r7, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x1c, 0x2000b7bb, 0x8, 0x401, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x4, 0x4, 0xb}, 0xffffffffffffff8b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x13, 0x5, &(0x7f0000000a80)=ANY=[@ANYRES32=r5], &(0x7f0000000580)='GPL\x00', 0x8, 0xfe, &(0x7f0000000980)=""/254, 0x40f00, 0x4}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x12) [ 457.394917][T11368] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 457.416074][T11369] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:21 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188090f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 457.461052][T11369] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 457.499891][T11368] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188041246ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 457.823937][T11377] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 457.916605][T11380] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 457.962626][T11377] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:22 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94}, [@call={0x85, 0x0, 0x0, 0x8000000e}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) openat$cgroup_ro(r1, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) [ 458.010206][T11380] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100081880a0f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f47ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188100f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:22 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7430ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca74803f410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:23 executing program 5: perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f0000000980)={0x0, 0x80, 0x80, 0x3f, 0x45, 0x2, 0x0, 0x698a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x200}, 0x240, 0x0, 0x0, 0x0, 0x1f, 0x3, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000740), 0x2}, 0x2840, 0xffffffffffffff9d, 0x3, 0x6, 0x58, 0x80000000, 0x10, 0x0, 0x800, 0x0, 0x1}, r0, 0x10, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1, 0x0, 0x0, 0x200000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 06:15:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188140f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:23 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca74810f410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:23 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94}, [@call={0x85, 0x0, 0x0, 0x8000000e}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(r1, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) 06:15:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e000000100081883c0f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040246ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef403000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040346ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef404000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040446ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 460.317512][T11431] bridge0: port 3(gretap0) entered blocking state [ 460.379724][T11431] bridge0: port 3(gretap0) entered disabled state [ 460.404561][T11431] gretap0: entered allmulticast mode [ 460.429326][T11431] gretap0: entered promiscuous mode [ 460.456897][T11431] bridge0: port 3(gretap0) entered blocking state [ 460.463650][T11431] bridge0: port 3(gretap0) entered forwarding state 06:15:25 executing program 5: perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open$cgroup(&(0x7f0000000980)={0x0, 0x80, 0x80, 0x3f, 0x45, 0x2, 0x0, 0x698a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x200}, 0x240, 0x0, 0x0, 0x0, 0x1f, 0x3, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000740), 0x2}, 0x2840, 0xffffffffffffff9d, 0x3, 0x6, 0x58, 0x80000000, 0x10, 0x0, 0x800, 0x0, 0x1}, r0, 0x10, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1, 0x0, 0x0, 0x200000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) gettid() (async) perf_event_open$cgroup(&(0x7f0000000980)={0x0, 0x80, 0x80, 0x3f, 0x45, 0x2, 0x0, 0x698a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x200}, 0x240, 0x0, 0x0, 0x0, 0x1f, 0x3, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000780)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000740), 0x2}, 0x2840, 0xffffffffffffff9d, 0x3, 0x6, 0x58, 0x80000000, 0x10, 0x0, 0x800, 0x0, 0x1}, r0, 0x10, r1, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1, 0x0, 0x0, 0x200000}, 0x1f00) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) (async) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) (async) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async) 06:15:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040546ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef405000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:25 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:25 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94}, [@call={0x85, 0x0, 0x0, 0x8000000e}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) openat$cgroup_ro(r1, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x4, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x94}, [@call={0x85, 0x0, 0x0, 0x8000000e}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) openat$cgroup_ro(r1, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) (async) 06:15:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040646ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 460.854818][T11445] bridge0: port 4(erspan0) entered blocking state [ 460.887210][T11445] bridge0: port 4(erspan0) entered disabled state [ 460.910421][T11445] erspan0: entered allmulticast mode [ 460.950196][T11445] erspan0: entered promiscuous mode [ 460.974484][T11445] bridge0: port 4(erspan0) entered blocking state [ 460.981226][T11445] bridge0: port 4(erspan0) entered forwarding state 06:15:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef406000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040746ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef407000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:25 executing program 5: perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() (async) r1 = perf_event_open$cgroup(&(0x7f0000000980)={0x0, 0x80, 0x80, 0x3f, 0x45, 0x2, 0x0, 0x698a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x200}, 0x240, 0x0, 0x0, 0x0, 0x1f, 0x3, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000780)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000740), 0x2}, 0x2840, 0xffffffffffffff9d, 0x3, 0x6, 0x58, 0x80000000, 0x10, 0x0, 0x800, 0x0, 0x1}, r0, 0x10, r1, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1, 0x0, 0x0, 0x200000}, 0x1f00) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 06:15:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040846ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef408000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:26 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040946ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:26 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x5af0, 0x0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x20, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000040000000000000001040000852000000400000018110000", @ANYRES32=r1, @ANYBLOB="000000b7080000400000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000078406001f0000009500000000000000eaa7ed4fafe54686bf3dc092add0e5f640715c2560"], &(0x7f0000000140)='GPL\x00', 0xb82, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x14, r2, 0x8, &(0x7f0000000380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x1, 0x10000, 0x7ff}, 0x10, r3, r0, 0x1, 0x0, &(0x7f0000000440)=[{0x5, 0x3, 0xd, 0xc}], 0x10, 0x9}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='afs_flock_ev\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:26 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:26 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) [ 461.994198][T11483] validate_nla: 51 callbacks suppressed [ 461.994223][T11483] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef409000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 462.085579][T11483] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:26 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040a46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 462.438005][T11489] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 462.475185][T11492] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40a000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 462.596366][T11497] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:27 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 462.715387][T11498] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 462.753228][T11501] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040b46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 462.764813][T11501] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40b000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:27 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) (async) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x5af0, 0x0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x20, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000040000000000000001040000852000000400000018110000", @ANYRES32=r1, @ANYBLOB="000000b7080000400000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000078406001f0000009500000000000000eaa7ed4fafe54686bf3dc092add0e5f640715c2560"], &(0x7f0000000140)='GPL\x00', 0xb82, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x14, r2, 0x8, &(0x7f0000000380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x1, 0x10000, 0x7ff}, 0x10, r3, r0, 0x1, 0x0, &(0x7f0000000440)=[{0x5, 0x3, 0xd, 0xc}], 0x10, 0x9}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='afs_flock_ev\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (rerun: 64) 06:15:27 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 462.950298][T11506] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 462.996228][T11507] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040c46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 463.058918][T11506] bridge0: port 5(syz_tun) entered blocking state [ 463.085355][T11506] bridge0: port 5(syz_tun) entered disabled state [ 463.154933][T11506] syz_tun: entered allmulticast mode [ 463.162576][T11506] syz_tun: entered promiscuous mode 06:15:27 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:27 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 463.196138][T11506] bridge0: port 5(syz_tun) entered blocking state [ 463.202835][T11506] bridge0: port 5(syz_tun) entered forwarding state 06:15:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040d46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40c000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:27 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 463.514323][T11523] bridge0: port 6(ip6gretap0) entered blocking state [ 463.546747][T11523] bridge0: port 6(ip6gretap0) entered disabled state 06:15:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040e46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:28 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 463.595474][T11523] ip6gretap0: entered allmulticast mode [ 463.603374][T11523] ip6gretap0: entered promiscuous mode [ 463.696131][T11523] bridge0: port 6(ip6gretap0) entered blocking state [ 463.703104][T11523] bridge0: port 6(ip6gretap0) entered forwarding state 06:15:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188041046ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40d000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:28 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef402000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188041146ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40e000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 06:15:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40d000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188041246ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:15:34 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001240)={0x18, 0x1d, &(0x7f0000000b40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x400}, {}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}}, @alu={0x0, 0x0, 0x1f, 0x1, 0x6, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a00)='syzkaller\x00', 0x1800000, 0xea, &(0x7f0000000e80)=""/234, 0x40f00, 0x29, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x5, 0x9, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000011c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000001200)=[{0x1, 0x4, 0x0, 0xa}], 0x10, 0x8}, 0x90) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x80000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffeff) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@volatile={0x6, 0x0, 0x0, 0x9, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x2b, 0x0, 0x1, 0x9}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={r0, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x2, &(0x7f0000000940)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000009c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000ac0)=[{}, {}], 0x10, 0x10, &(0x7f0000000b00), &(0x7f0000000c40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000c80)}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r2, &(0x7f0000000040)=ANY=[], 0x34100) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40001) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuacct.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x34100) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000000900)={&(0x7f0000000200), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000780)=""/205, 0xcd}, {&(0x7f0000000880)=""/101, 0x65}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000120) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000e40)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 06:15:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 06:15:34 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)=r0}, 0x20) (async, rerun: 32) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=0xffffffffffffffff, 0x4) (async, rerun: 32) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x5af0, 0x0}, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x20, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000040000000000000001040000852000000400000018110000", @ANYRES32=r1, @ANYBLOB="000000b7080000400000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000078406001f0000009500000000000000eaa7ed4fafe54686bf3dc092add0e5f640715c2560"], &(0x7f0000000140)='GPL\x00', 0xb82, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x14, r2, 0x8, &(0x7f0000000380)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x3, 0x1, 0x10000, 0x7ff}, 0x10, r3, r0, 0x1, 0x0, &(0x7f0000000440)=[{0x5, 0x3, 0xd, 0xc}], 0x10, 0x9}, 0x90) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00', 0x0, 0x8}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='afs_flock_ev\x00', r4}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 470.597996][T11551] validate_nla: 18 callbacks suppressed [ 470.598020][T11551] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 470.638035][T11551] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:15:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xa, [@var={0x1, 0x0, 0x0, 0xe, 0x1, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x62, 0x0, 0x1f, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x19, 0x0, 0x5c, 0xc}, @fwd={0xe}]}, {0x0, [0x30, 0x0, 0x61, 0x30, 0x5f, 0x30, 0x5f, 0x6f]}}, &(0x7f0000000140)=""/41, 0x5e, 0x29, 0x1, 0x3f}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000101400000000000000000000008500e276e469c775caf24e00000e0000009520000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 470.658730][T11551] bridge0: port 7(bond0) entered blocking state [ 470.677479][T11551] bridge0: port 7(bond0) entered disabled state 06:15:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 470.704566][T11551] bond0: entered allmulticast mode [ 470.733820][T11551] bond_slave_0: entered allmulticast mode [ 470.741627][T11551] bond_slave_1: entered allmulticast mode [ 470.784868][T11551] bond0: entered promiscuous mode 06:15:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xa, [@var={0x1, 0x0, 0x0, 0xe, 0x1, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x62, 0x0, 0x1f, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x19, 0x0, 0x5c, 0xc}, @fwd={0xe}]}, {0x0, [0x30, 0x0, 0x61, 0x30, 0x5f, 0x30, 0x5f, 0x6f]}}, &(0x7f0000000140)=""/41, 0x5e, 0x29, 0x1, 0x3f}, 0x20) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000101400000000000000000000008500e276e469c775caf24e00000e0000009520000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 470.813167][T11551] bond_slave_0: entered promiscuous mode [ 470.836858][T11551] bond_slave_1: entered promiscuous mode 06:15:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 470.871547][T11551] bridge0: port 7(bond0) entered blocking state [ 470.878182][T11551] bridge0: port 7(bond0) entered forwarding state [ 470.958425][T11553] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 470.990906][T11558] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 06:15:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef411000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 471.005393][T11560] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 06:15:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188041446ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 471.051836][T11561] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 06:15:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 06:15:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0xa, [@var={0x1, 0x0, 0x0, 0xe, 0x1, 0x1}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x62, 0x0, 0x1f, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x19, 0x0, 0x5c, 0xc}, @fwd={0xe}]}, {0x0, [0x30, 0x0, 0x61, 0x30, 0x5f, 0x30, 0x5f, 0x6f]}}, &(0x7f0000000140)=""/41, 0x5e, 0x29, 0x1, 0x3f}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000101400000000000000000000008500e276e469c775caf24e00000e0000009520000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000101400000000000000000000008500e276e469c775caf24e00000e0000009520000000000000"], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x700, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40d000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 471.227520][T11574] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 471.276824][T11574] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 471.321725][T11574] bridge0: port 8(dummy0) entered blocking state 06:15:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 471.381161][T11574] bridge0: port 8(dummy0) entered disabled state 06:15:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@ldst={0x0, 0x1, 0x0, 0x5, 0xf, 0x1, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 471.438332][T11574] dummy0: entered allmulticast mode [ 471.488262][T11574] ================================================================== [ 471.496399][T11574] BUG: KASAN: slab-out-of-bounds in dsa_user_changeupper+0x61a/0x6e0 [ 471.504541][T11574] Read of size 8 at addr ffff888041982c90 by task syz-executor.1/11574 [ 471.512833][T11574] [ 471.515183][T11574] CPU: 0 PID: 11574 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0 [ 471.525294][T11574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 471.535387][T11574] Call Trace: [ 471.538699][T11574] [ 471.541667][T11574] dump_stack_lvl+0xd9/0x1b0 [ 471.546320][T11574] print_report+0xc4/0x620 [ 471.550795][T11574] ? __virt_addr_valid+0x5e/0x580 [ 471.555887][T11574] ? __phys_addr+0xc6/0x140 [ 471.560457][T11574] kasan_report+0xda/0x110 [ 471.564933][T11574] ? dsa_user_changeupper+0x61a/0x6e0 [ 471.570383][T11574] ? dsa_user_changeupper+0x61a/0x6e0 [ 471.575831][T11574] dsa_user_changeupper+0x61a/0x6e0 [ 471.581109][T11574] dsa_user_netdevice_event+0xd04/0x3480 [ 471.586824][T11574] ? rcu_is_watching+0x12/0xb0 [ 471.591671][T11574] ? lock_release+0x4bf/0x690 [ 471.596403][T11574] ? br_vlan_port_event+0x81/0x4c0 [ 471.601592][T11574] ? tls_dev_event+0xfe/0x1110 [ 471.606405][T11574] ? dsa_user_change_conduit+0x7e0/0x7e0 [ 471.612113][T11574] ? tun_device_event+0x74/0x1260 [ 471.617212][T11574] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 471.623171][T11574] ? br_device_event+0x245/0x910 [ 471.628171][T11574] ? br_switchdev_event+0x5b0/0x5b0 [ 471.633432][T11574] ? packet_notifier+0x1b7/0x8c0 [ 471.638431][T11574] notifier_call_chain+0xb6/0x3b0 [ 471.643525][T11574] ? dsa_user_change_conduit+0x7e0/0x7e0 [ 471.649240][T11574] call_netdevice_notifiers_info+0xbe/0x130 [ 471.655204][T11574] __netdev_upper_dev_link+0x439/0x850 [ 471.660729][T11574] ? __dev_change_net_namespace+0x12f0/0x12f0 [ 471.666877][T11574] ? kernfs_add_one+0x17f/0x510 [ 471.671799][T11574] netdev_master_upper_dev_link+0xa0/0xd0 [ 471.677601][T11574] ? netdev_upper_dev_link+0xc0/0xc0 [ 471.682951][T11574] ? br_handle_frame_finish+0x1dc0/0x1dc0 06:15:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@ldst={0x0, 0x1, 0x0, 0x5, 0xf, 0x1, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)}, 0x0) 06:15:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)}, 0x0) [ 471.688746][T11574] ? mutex_is_locked+0x12/0x40 [ 471.693582][T11574] ? rtnl_is_locked+0x15/0x20 [ 471.698325][T11574] ? netdev_is_rx_handler_busy+0x83/0x160 [ 471.704115][T11574] br_add_if+0xa8a/0x1b70 [ 471.708531][T11574] ? br_del_slave+0x30/0x30 [ 471.713101][T11574] do_set_master+0x1b5/0x220 [ 471.717770][T11574] do_setlink+0xa4a/0x4090 [ 471.722247][T11574] ? vprintk_emit+0x123/0x5f0 [ 471.726987][T11574] ? rtnl_bridge_getlink+0x8c0/0x8c0 [ 471.732332][T11574] ? vprintk+0x82/0x90 [ 471.736473][T11574] ? _printk+0xc8/0x100 [ 471.740703][T11574] ? kmsg_dump_get_line+0x350/0x350 [ 471.745979][T11574] ? ___ratelimit+0x24c/0x570 [ 471.750718][T11574] ? rcu_is_watching+0x12/0xb0 [ 471.755552][T11574] ? idr_get_free+0xa30/0xa30 [ 471.760294][T11574] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 471.766265][T11574] ? __nla_validate_parse+0x615/0x28b0 [ 471.771796][T11574] ? nla_get_range_signed+0x370/0x370 [ 471.777238][T11574] ? _raw_read_unlock_irqrestore+0x3b/0x70 [ 471.783116][T11574] ? stack_depot_save_flags+0x259/0x730 06:15:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@ldst={0x0, 0x1, 0x0, 0x5, 0xf, 0x1, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000340)=@framed={{}, [@ldst={0x0, 0x1, 0x0, 0x5, 0xf, 0x1, 0xfffffffffffffff0}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) [ 471.788742][T11574] ? __nla_parse+0x40/0x50 [ 471.793231][T11574] __rtnl_newlink+0xc28/0x1940 [ 471.798068][T11574] ? rtnl_link_unregister+0x260/0x260 [ 471.803529][T11574] rtnl_newlink+0x67/0xa0 [ 471.807914][T11574] ? __rtnl_newlink+0x1940/0x1940 [ 471.812991][T11574] rtnetlink_rcv_msg+0x3c7/0xe00 [ 471.817988][T11574] ? rtnl_fill_vf+0x490/0x490 [ 471.822749][T11574] netlink_rcv_skb+0x16b/0x440 [ 471.827588][T11574] ? rtnl_fill_vf+0x490/0x490 [ 471.832324][T11574] ? netlink_ack+0x1380/0x1380 06:15:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRES32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 471.837177][T11574] ? netlink_deliver_tap+0x1a0/0xd00 [ 471.842538][T11574] netlink_unicast+0x53b/0x810 [ 471.847373][T11574] ? netlink_attachskb+0x880/0x880 [ 471.852548][T11574] ? __phys_addr_symbol+0x30/0x70 [ 471.857642][T11574] ? __check_object_size+0x323/0x730 [ 471.863004][T11574] netlink_sendmsg+0x8b7/0xd70 [ 471.867843][T11574] ? netlink_unicast+0x810/0x810 [ 471.872849][T11574] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 471.878208][T11574] ? netlink_unicast+0x810/0x810 [ 471.883212][T11574] __sock_sendmsg+0xd5/0x180 06:15:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)}, 0x0) [ 471.887882][T11574] ____sys_sendmsg+0x6ac/0x940 [ 471.892733][T11574] ? copy_msghdr_from_user+0x10b/0x160 [ 471.898252][T11574] ? kernel_sendmsg+0x50/0x50 [ 471.903018][T11574] ? try_to_wake_up+0xc00/0x13d0 [ 471.908033][T11574] ___sys_sendmsg+0x135/0x1d0 [ 471.912769][T11574] ? do_recvmmsg+0x740/0x740 [ 471.917416][T11574] ? rcu_is_watching+0x12/0xb0 [ 471.922260][T11574] ? __fget_light+0x173/0x200 [ 471.926999][T11574] __sys_sendmsg+0x117/0x1e0 [ 471.931649][T11574] ? __sys_sendmsg_sock+0x30/0x30 06:15:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x0) [ 471.936748][T11574] ? rcu_is_watching+0x12/0xb0 [ 471.941586][T11574] do_syscall_64+0xd3/0x250 [ 471.946159][T11574] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 471.952105][T11574] RIP: 0033:0x7f5dfd87cda9 [ 471.956603][T11574] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 471.976273][T11574] RSP: 002b:00007f5dfe62b0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 471.984761][T11574] RAX: ffffffffffffffda RBX: 00007f5dfd9abf80 RCX: 00007f5dfd87cda9 [ 471.992786][T11574] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 472.000810][T11574] RBP: 00007f5dfd8c947a R08: 0000000000000000 R09: 0000000000000000 [ 472.008830][T11574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 472.016862][T11574] R13: 000000000000000b R14: 00007f5dfd9abf80 R15: 00007ffd7f1ffc08 [ 472.024899][T11574] [ 472.027953][T11574] [ 472.030303][T11574] Allocated by task 5101: [ 472.034697][T11574] kasan_save_stack+0x33/0x50 06:15:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x0) [ 472.039432][T11574] kasan_save_track+0x14/0x30 [ 472.044160][T11574] __kasan_kmalloc+0xa2/0xb0 [ 472.048800][T11574] __kmalloc_node+0x21b/0x460 [ 472.053542][T11574] kvmalloc_node+0x99/0x1a0 [ 472.058107][T11574] alloc_netdev_mqs+0xb3/0x12a0 [ 472.063019][T11574] rtnl_create_link+0xc82/0xfb0 [ 472.067940][T11574] __rtnl_newlink+0x10a1/0x1940 [ 472.072837][T11574] rtnl_newlink+0x67/0xa0 [ 472.077216][T11574] rtnetlink_rcv_msg+0x3c7/0xe00 [ 472.082206][T11574] netlink_rcv_skb+0x16b/0x440 06:15:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRES32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRES32], &(0x7f00000000c0)='GPL\x00'}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) (async) [ 472.087027][T11574] netlink_unicast+0x53b/0x810 [ 472.091851][T11574] netlink_sendmsg+0x8b7/0xd70 [ 472.096666][T11574] __sock_sendmsg+0xd5/0x180 [ 472.101343][T11574] __sys_sendto+0x225/0x310 [ 472.105903][T11574] __x64_sys_sendto+0xe0/0x1b0 [ 472.110718][T11574] do_syscall_64+0xd3/0x250 [ 472.115315][T11574] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 472.121273][T11574] [ 472.123663][T11574] The buggy address belongs to the object at ffff888041982000 [ 472.123663][T11574] which belongs to the cache kmalloc-cg-4k of size 4096 [ 472.138025][T11574] The buggy address is located 3216 bytes inside of [ 472.138025][T11574] allocated 3223-byte region [ffff888041982000, ffff888041982c97) [ 472.152404][T11574] [ 472.154766][T11574] The buggy address belongs to the physical page: [ 472.161212][T11574] page:ffffea0001066000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x41980 [ 472.171434][T11574] head:ffffea0001066000 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 472.180419][T11574] memcg:ffff88802bb60401 06:15:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000000040)=ANY=[@ANYRES32], &(0x7f00000000c0)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_ro(r1, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) 06:15:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{0x0}], 0x1}, 0x0) [ 472.184686][T11574] anon flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 472.193148][T11574] page_type: 0xffffffff() [ 472.197529][T11574] raw: 00fff00000000840 ffff88801304f500 0000000000000000 dead000000000001 [ 472.206163][T11574] raw: 0000000000000000 0000000000040004 00000001ffffffff ffff88802bb60401 [ 472.214781][T11574] page dumped because: kasan: bad access detected [ 472.221229][T11574] page_owner tracks the page as allocated [ 472.226991][T11574] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5089, tgid 5089 (syz-executor.0), ts 220198476892, free_ts 30351273617 [ 472.248676][T11574] post_alloc_hook+0x2d0/0x350 [ 472.253516][T11574] get_page_from_freelist+0xa28/0x3780 [ 472.259034][T11574] __alloc_pages+0x22f/0x2440 [ 472.263753][T11574] new_slab+0xcc/0x3a0 [ 472.267871][T11574] ___slab_alloc+0x4af/0x19a0 [ 472.272605][T11574] __slab_alloc.constprop.0+0x56/0xa0 [ 472.278048][T11574] __kmalloc_node_track_caller+0x35b/0x460 [ 472.283915][T11574] kmemdup+0x29/0x60 06:15:36 executing program 0: r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002cc0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0xa0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000006c4fffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000003500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000003580)=[0x0], &(0x7f0000000a00)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000780), 0x0, 0x10, &(0x7f0000000500), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f0000001840)}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000006c0)={0xffffffffffffffff, 0x7}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x2, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000440)='syzkaller\x00', 0x7, 0x22, &(0x7f0000000480)=""/34, 0x41100, 0x53, '\x00', r2, 0x0, r3, 0x8, &(0x7f00000004c0)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x7, 0x10000, 0x8}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000700)=[r4, r3, r3, r3], &(0x7f00000007c0)=[{0x2, 0x3, 0x0, 0xa}, {0x3, 0x5, 0xc, 0x7}, {0x1, 0x2, 0x7, 0x8}, {0x5, 0x3, 0x2, 0x9}, {0x4, 0x5, 0x10, 0x3}]}, 0x90) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x2, &(0x7f00000018c0)=@raw=[@map_val={0x18, 0x2, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='ext4_ext_remove_space_done\x00', r5}, 0x10) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000035c0)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000014c0)={&(0x7f0000001380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7b, 0x7b, 0x7, [@union={0x9, 0x1, 0x0, 0x5, 0x0, 0x6, [{0x10, 0x5, 0x6}]}, @struct={0x3, 0x2, 0x0, 0x4, 0x0, 0x8, [{0x3, 0x0, 0xd07}, {0x10, 0x3, 0xffffffff}]}, @datasec={0x6, 0x4, 0x0, 0xf, 0x3, [{0x3, 0x4, 0x8000}, {0x5, 0x1f, 0x8000}, {0x3, 0xff, 0x6ef}, {0x5, 0x8, 0x81}], "aef5ec"}]}, {0x0, [0x60, 0x71, 0x0, 0x5f, 0x61]}}, &(0x7f0000001440)=""/68, 0x9b, 0x44, 0x0, 0x7fffffff}, 0x20) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000001780), 0x200800, 0x0) ioctl$TUNGETVNETHDRSZ(r9, 0x800454d7, &(0x7f00000017c0)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000003540)={'veth0_to_team\x00', 0x400}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001580)={0x40, 0x0}, 0x8) r11 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x40, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x3}, 0x48) recvmsg$unix(r3, &(0x7f00000034c0)={&(0x7f0000002d40), 0x6e, &(0x7f0000003380)=[{&(0x7f0000002dc0)=""/178, 0xb2}, {&(0x7f0000002e80)=""/189, 0xbd}, {&(0x7f0000002f40)=""/4, 0x4}, {&(0x7f0000002f80)=""/67, 0x43}, {&(0x7f0000003000)=""/23, 0x17}, {&(0x7f0000003040)=""/8, 0x8}, {&(0x7f0000003080)=""/127, 0x7f}, {&(0x7f0000003100)=""/193, 0xc1}, {&(0x7f0000003200)=""/197, 0xc5}, {&(0x7f0000003300)=""/126, 0x7e}], 0xa, &(0x7f0000003440)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x13, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="6c920000fcffffff1817fd9b", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000140)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000380)=""/4096, 0x40f00, 0x4, '\x00', r7, 0xf, r8, 0x8, &(0x7f0000001500)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000001540)={0x1, 0x5, 0x4, 0x7}, 0x10, r10, 0xffffffffffffffff, 0x1, &(0x7f0000001640)=[r11, r5], &(0x7f0000001680)=[{0x1, 0x5, 0x7, 0x6}], 0x10, 0xec80}, 0x90) r12 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002b00)=@bpf_lsm={0x1d, 0x2, &(0x7f0000001980)=@raw=[@map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x200}], &(0x7f00000019c0)='syzkaller\x00', 0xcf1, 0x1000, &(0x7f0000001a00)=""/4096, 0x0, 0x0, '\x00', r7, 0x1b, r8, 0x8, &(0x7f0000002a00)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000002a40)={0x4, 0xd, 0x1000, 0x8}, 0x10, r10, 0x0, 0x1, &(0x7f0000002a80)=[r6, r11, r11, r6], &(0x7f0000002ac0)=[{0x5, 0x5, 0x2, 0x4c640dc123ee3e01}], 0x10, 0x100}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000002c00)={0x15, 0x3, &(0x7f0000001800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8}}, &(0x7f0000001880)='syzkaller\x00', 0x74, 0x0, &(0x7f00000018c0), 0x41000, 0x28, '\x00', r7, 0x22, r8, 0x8, &(0x7f0000001900)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000001940)={0x1, 0x5, 0x0, 0xa0f}, 0x10, r10, r12, 0x0, &(0x7f0000002bc0)=[r6, r11], 0x0, 0x10, 0x6ac}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) [ 472.287869][T11574] __addrconf_sysctl_register+0xc2/0x3f0 [ 472.293647][T11574] addrconf_sysctl_register+0x153/0x1e0 [ 472.299256][T11574] ipv6_add_dev+0x9f8/0x13d0 [ 472.303902][T11574] addrconf_notify+0x542/0x18f0 [ 472.308829][T11574] notifier_call_chain+0xb6/0x3b0 [ 472.313922][T11574] call_netdevice_notifiers_info+0xbe/0x130 [ 472.319881][T11574] register_netdevice+0x16e2/0x1da0 [ 472.325137][T11574] batadv_softif_newlink+0x70/0x90 [ 472.330326][T11574] page last free pid 1 tgid 1 stack trace: [ 472.336163][T11574] free_unref_page_prepare+0x51f/0xb10 06:15:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)}], 0x1}, 0x0) [ 472.341690][T11574] free_unref_page+0x33/0x3c0 [ 472.346448][T11574] free_contig_range+0xb6/0x190 [ 472.351362][T11574] destroy_args+0xa69/0xe40 [ 472.355918][T11574] debug_vm_pgtable+0x16fe/0x3250 [ 472.360996][T11574] do_one_initcall+0x11c/0x650 [ 472.365823][T11574] kernel_init_freeable+0x687/0xc10 [ 472.371086][T11574] kernel_init+0x1c/0x2a0 [ 472.375471][T11574] ret_from_fork+0x45/0x80 [ 472.379960][T11574] ret_from_fork_asm+0x11/0x20 [ 472.384786][T11574] [ 472.387133][T11574] Memory state around the buggy address: [ 472.392808][T11574] ffff888041982b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 472.400915][T11574] ffff888041982c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 472.409026][T11574] >ffff888041982c80: 00 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 472.417124][T11574] ^ [ 472.421754][T11574] ffff888041982d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 472.429871][T11574] ffff888041982d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 06:15:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)}], 0x1}, 0x0) [ 472.437969][T11574] ================================================================== [ 472.504918][T11574] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 472.512181][T11574] CPU: 1 PID: 11574 Comm: syz-executor.1 Not tainted 6.7.0-syzkaller-04667-g9d1a26e7e43c #0 [ 472.522302][T11574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 [ 472.532407][T11574] Call Trace: [ 472.535725][T11574] [ 472.538696][T11574] dump_stack_lvl+0xd9/0x1b0 [ 472.543358][T11574] panic+0x6dc/0x790 [ 472.547321][T11574] ? panic_smp_self_stop+0xa0/0xa0 [ 472.552520][T11574] ? rcu_is_watching+0x12/0xb0 [ 472.557364][T11574] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 472.563428][T11574] ? preempt_schedule_thunk+0x1a/0x30 [ 472.568880][T11574] ? preempt_schedule_common+0x45/0xc0 [ 472.574433][T11574] check_panic_on_warn+0xab/0xb0 [ 472.579450][T11574] end_report+0x108/0x150 [ 472.583843][T11574] kasan_report+0xea/0x110 [ 472.588334][T11574] ? dsa_user_changeupper+0x61a/0x6e0 [ 472.593788][T11574] ? dsa_user_changeupper+0x61a/0x6e0 [ 472.599249][T11574] dsa_user_changeupper+0x61a/0x6e0 [ 472.604534][T11574] dsa_user_netdevice_event+0xd04/0x3480 [ 472.610251][T11574] ? rcu_is_watching+0x12/0xb0 [ 472.615088][T11574] ? lock_release+0x4bf/0x690 [ 472.619827][T11574] ? br_vlan_port_event+0x81/0x4c0 [ 472.625024][T11574] ? tls_dev_event+0xfe/0x1110 [ 472.629857][T11574] ? dsa_user_change_conduit+0x7e0/0x7e0 [ 472.635575][T11574] ? tun_device_event+0x74/0x1260 [ 472.640681][T11574] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 472.646661][T11574] ? br_device_event+0x245/0x910 [ 472.651668][T11574] ? br_switchdev_event+0x5b0/0x5b0 [ 472.657089][T11574] ? packet_notifier+0x1b7/0x8c0 [ 472.662080][T11574] notifier_call_chain+0xb6/0x3b0 [ 472.667167][T11574] ? dsa_user_change_conduit+0x7e0/0x7e0 [ 472.672850][T11574] call_netdevice_notifiers_info+0xbe/0x130 [ 472.678789][T11574] __netdev_upper_dev_link+0x439/0x850 [ 472.684298][T11574] ? __dev_change_net_namespace+0x12f0/0x12f0 [ 472.690409][T11574] ? kernfs_add_one+0x17f/0x510 [ 472.695305][T11574] netdev_master_upper_dev_link+0xa0/0xd0 [ 472.701071][T11574] ? netdev_upper_dev_link+0xc0/0xc0 [ 472.706397][T11574] ? br_handle_frame_finish+0x1dc0/0x1dc0 [ 472.712155][T11574] ? mutex_is_locked+0x12/0x40 [ 472.716957][T11574] ? rtnl_is_locked+0x15/0x20 [ 472.721675][T11574] ? netdev_is_rx_handler_busy+0x83/0x160 [ 472.727425][T11574] br_add_if+0xa8a/0x1b70 [ 472.731798][T11574] ? br_del_slave+0x30/0x30 [ 472.736331][T11574] do_set_master+0x1b5/0x220 [ 472.740972][T11574] do_setlink+0xa4a/0x4090 [ 472.745428][T11574] ? vprintk_emit+0x123/0x5f0 [ 472.750135][T11574] ? rtnl_bridge_getlink+0x8c0/0x8c0 [ 472.755446][T11574] ? vprintk+0x82/0x90 [ 472.759542][T11574] ? _printk+0xc8/0x100 [ 472.763739][T11574] ? kmsg_dump_get_line+0x350/0x350 [ 472.768985][T11574] ? ___ratelimit+0x24c/0x570 [ 472.773692][T11574] ? rcu_is_watching+0x12/0xb0 [ 472.778499][T11574] ? idr_get_free+0xa30/0xa30 [ 472.783210][T11574] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 472.789139][T11574] ? __nla_validate_parse+0x615/0x28b0 [ 472.794636][T11574] ? nla_get_range_signed+0x370/0x370 [ 472.800043][T11574] ? _raw_read_unlock_irqrestore+0x3b/0x70 [ 472.805887][T11574] ? stack_depot_save_flags+0x259/0x730 [ 472.811559][T11574] ? __nla_parse+0x40/0x50 [ 472.816006][T11574] __rtnl_newlink+0xc28/0x1940 [ 472.820812][T11574] ? rtnl_link_unregister+0x260/0x260 [ 472.826232][T11574] rtnl_newlink+0x67/0xa0 [ 472.830588][T11574] ? __rtnl_newlink+0x1940/0x1940 [ 472.835642][T11574] rtnetlink_rcv_msg+0x3c7/0xe00 [ 472.840609][T11574] ? rtnl_fill_vf+0x490/0x490 [ 472.845340][T11574] netlink_rcv_skb+0x16b/0x440 [ 472.850138][T11574] ? rtnl_fill_vf+0x490/0x490 [ 472.854842][T11574] ? netlink_ack+0x1380/0x1380 [ 472.859647][T11574] ? netlink_deliver_tap+0x1a0/0xd00 [ 472.864971][T11574] netlink_unicast+0x53b/0x810 [ 472.869773][T11574] ? netlink_attachskb+0x880/0x880 [ 472.874920][T11574] ? __phys_addr_symbol+0x30/0x70 [ 472.879988][T11574] ? __check_object_size+0x323/0x730 [ 472.885316][T11574] netlink_sendmsg+0x8b7/0xd70 [ 472.890115][T11574] ? netlink_unicast+0x810/0x810 [ 472.895087][T11574] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 472.900408][T11574] ? netlink_unicast+0x810/0x810 [ 472.905378][T11574] __sock_sendmsg+0xd5/0x180 [ 472.910010][T11574] ____sys_sendmsg+0x6ac/0x940 [ 472.914839][T11574] ? copy_msghdr_from_user+0x10b/0x160 [ 472.920352][T11574] ? kernel_sendmsg+0x50/0x50 [ 472.925091][T11574] ? try_to_wake_up+0xc00/0x13d0 [ 472.930065][T11574] ___sys_sendmsg+0x135/0x1d0 [ 472.934773][T11574] ? do_recvmmsg+0x740/0x740 [ 472.939388][T11574] ? rcu_is_watching+0x12/0xb0 [ 472.944202][T11574] ? __fget_light+0x173/0x200 [ 472.948914][T11574] __sys_sendmsg+0x117/0x1e0 [ 472.953533][T11574] ? __sys_sendmsg_sock+0x30/0x30 [ 472.958600][T11574] ? rcu_is_watching+0x12/0xb0 [ 472.963398][T11574] do_syscall_64+0xd3/0x250 [ 472.967941][T11574] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 472.973862][T11574] RIP: 0033:0x7f5dfd87cda9 [ 472.978297][T11574] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 472.997929][T11574] RSP: 002b:00007f5dfe62b0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 473.006370][T11574] RAX: ffffffffffffffda RBX: 00007f5dfd9abf80 RCX: 00007f5dfd87cda9 [ 473.014360][T11574] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 473.022349][T11574] RBP: 00007f5dfd8c947a R08: 0000000000000000 R09: 0000000000000000 [ 473.030426][T11574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 473.038503][T11574] R13: 000000000000000b R14: 00007f5dfd9abf80 R15: 00007ffd7f1ffc08 [ 473.046503][T11574] [ 473.049788][T11574] Kernel Offset: disabled [ 473.054113][T11574] Rebooting in 86400 seconds..