1 [ 14.106254][ T27] audit: type=1400 audit(1707019391.264:80): avc: denied { siginh } for pid=2951 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 15.207561][ T2954] sftp-server (2954) used greatest stack depth: 11952 bytes left [ 15.218015][ T2952] sshd (2952) used greatest stack depth: 11616 bytes left [ 16.124221][ T27] audit: type=1400 audit(1707019393.284:81): avc: denied { read } for pid=2755 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.0.200' (ED25519) to the list of known hosts. 2024/02/04 04:03:18 fuzzer started 2024/02/04 04:03:18 dialing manager at 10.128.0.163:30015 2024/02/04 04:03:18 checking machine... 2024/02/04 04:03:18 checking revisions... [ 21.448945][ T27] audit: type=1400 audit(1707019398.614:82): avc: denied { node_bind } for pid=3064 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 21.469599][ T27] audit: type=1400 audit(1707019398.614:83): avc: denied { name_bind } for pid=3064 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 2024/02/04 04:03:18 testing simple program... [ 21.563442][ T27] audit: type=1400 audit(1707019398.724:84): avc: denied { getattr } for pid=3064 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.580391][ T3073] cgroup: Unknown subsys name 'net' [ 21.586969][ T27] audit: type=1400 audit(1707019398.724:85): avc: denied { read } for pid=3064 comm="syz-fuzzer" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.612976][ T27] audit: type=1400 audit(1707019398.724:86): avc: denied { open } for pid=3064 comm="syz-fuzzer" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 21.636077][ T27] audit: type=1400 audit(1707019398.744:87): avc: denied { mounton } for pid=3073 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.658734][ T27] audit: type=1400 audit(1707019398.744:88): avc: denied { mount } for pid=3073 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.680876][ T27] audit: type=1400 audit(1707019398.754:89): avc: denied { unmount } for pid=3073 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.876729][ T3073] cgroup: Unknown subsys name 'rlimit' [ 21.967688][ T27] audit: type=1400 audit(1707019399.134:90): avc: denied { mounton } for pid=3073 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.992509][ T27] audit: type=1400 audit(1707019399.134:91): avc: denied { mount } for pid=3073 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 22.020623][ T3075] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 22.039092][ T3073] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 22.194574][ T3078] chnl_net:caif_netlink_parms(): no params data found [ 22.224041][ T3078] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.231163][ T3078] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.238361][ T3078] bridge_slave_0: entered allmulticast mode [ 22.244719][ T3078] bridge_slave_0: entered promiscuous mode [ 22.251324][ T3078] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.258525][ T3078] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.265695][ T3078] bridge_slave_1: entered allmulticast mode [ 22.271853][ T3078] bridge_slave_1: entered promiscuous mode [ 22.286648][ T3078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 22.296620][ T3078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 22.313264][ T3078] team0: Port device team_slave_0 added [ 22.319515][ T3078] team0: Port device team_slave_1 added [ 22.333905][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 22.340870][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 22.366756][ T3078] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 22.377966][ T3078] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 22.384963][ T3078] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 22.410853][ T3078] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 22.433593][ T3078] hsr_slave_0: entered promiscuous mode [ 22.439644][ T3078] hsr_slave_1: entered promiscuous mode [ 22.494163][ T3078] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 22.502753][ T3078] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 22.511047][ T3078] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 22.519469][ T3078] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 22.532587][ T3078] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.539660][ T3078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.546905][ T3078] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.554092][ T3078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.580478][ T3078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 22.590618][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.598972][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.609868][ T3078] 8021q: adding VLAN 0 to HW filter on device team0 [ 22.619180][ T3093] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.626263][ T3093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.644309][ T3078] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 22.654780][ T3078] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 22.668375][ T3094] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.675529][ T3094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.717064][ T3078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 22.772110][ T3078] veth0_vlan: entered promiscuous mode [ 22.780009][ T3078] veth1_vlan: entered promiscuous mode [ 22.793768][ T3078] veth0_macvtap: entered promiscuous mode [ 22.800938][ T3078] veth1_macvtap: entered promiscuous mode [ 22.811458][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 22.822254][ T3078] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 22.831277][ T3078] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.840049][ T3078] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.848793][ T3078] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 22.857567][ T3078] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 2024/02/04 04:03:20 building call list... executing program [ 25.034979][ T3067] can: request_module (can-proto-0) failed. [ 25.047576][ T3067] can: request_module (can-proto-0) failed. [ 25.059657][ T3067] can: request_module (can-proto-0) failed. [ 25.213579][ T3067] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 25.318778][ T3067] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 26.215898][ T3078] syz-executor.0 (3078) used greatest stack depth: 10528 bytes left [ 26.226670][ T38] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.448421][ T38] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.508317][ T38] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.568831][ T38] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 28.641532][ T27] kauditd_printk_skb: 76 callbacks suppressed [ 28.641544][ T27] audit: type=1400 audit(1707019405.804:168): avc: denied { search } for pid=2811 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.668872][ T27] audit: type=1400 audit(1707019405.814:169): avc: denied { read } for pid=2811 comm="dhcpcd" name="n25" dev="tmpfs" ino=398 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 28.690409][ T27] audit: type=1400 audit(1707019405.814:170): avc: denied { open } for pid=2811 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=398 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 28.713253][ T27] audit: type=1400 audit(1707019405.814:171): avc: denied { getattr } for pid=2811 comm="dhcpcd" path="/run/udev/data/n25" dev="tmpfs" ino=398 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 28.736657][ T27] audit: type=1400 audit(1707019405.834:172): avc: denied { read } for pid=3173 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.759896][ T27] audit: type=1400 audit(1707019405.834:173): avc: denied { open } for pid=3173 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.784759][ T27] audit: type=1400 audit(1707019405.834:174): avc: denied { getattr } for pid=3173 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=342 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.809945][ T27] audit: type=1400 audit(1707019405.874:175): avc: denied { write } for pid=3172 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=341 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.832948][ T27] audit: type=1400 audit(1707019405.874:176): avc: denied { add_name } for pid=3172 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 28.855342][ T27] audit: type=1400 audit(1707019405.874:177): avc: denied { create } for pid=3172 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 29.307425][ T38] hsr_slave_0: left promiscuous mode [ 29.313163][ T38] hsr_slave_1: left promiscuous mode [ 29.319178][ T38] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 29.326604][ T38] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 29.334311][ T38] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 29.341762][ T38] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 29.349721][ T38] bridge_slave_1: left allmulticast mode [ 29.355393][ T38] bridge_slave_1: left promiscuous mode [ 29.361134][ T38] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.369314][ T38] bridge_slave_0: left allmulticast mode [ 29.374971][ T38] bridge_slave_0: left promiscuous mode [ 29.380636][ T38] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.389496][ T38] veth1_macvtap: left promiscuous mode [ 29.394959][ T38] veth0_macvtap: left promiscuous mode [ 29.400463][ T38] veth1_vlan: left promiscuous mode [ 29.405721][ T38] veth0_vlan: left promiscuous mode [ 29.472758][ T38] team0 (unregistering): Port device team_slave_1 removed [ 29.482789][ T38] team0 (unregistering): Port device team_slave_0 removed [ 29.492091][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 29.502473][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 29.527087][ T38] bond0 (unregistering): Released all slaves [ 36.401418][ T27] kauditd_printk_skb: 4 callbacks suppressed [ 36.401429][ T27] audit: type=1400 audit(1707019413.564:182): avc: denied { remove_name } for pid=2755 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 36.430131][ T27] audit: type=1400 audit(1707019413.564:183): avc: denied { rename } for pid=2755 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 36.452264][ T27] audit: type=1400 audit(1707019413.564:184): avc: denied { create } for pid=2755 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 2024/02/04 04:04:16 syscalls: 2890 2024/02/04 04:04:16 code coverage: enabled 2024/02/04 04:04:16 comparison tracing: enabled 2024/02/04 04:04:16 extra coverage: enabled 2024/02/04 04:04:16 delay kcov mmap: enabled 2024/02/04 04:04:16 setuid sandbox: enabled 2024/02/04 04:04:16 namespace sandbox: enabled 2024/02/04 04:04:16 Android sandbox: enabled 2024/02/04 04:04:16 fault injection: enabled 2024/02/04 04:04:16 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2024/02/04 04:04:16 net packet injection: enabled 2024/02/04 04:04:16 net device setup: enabled 2024/02/04 04:04:16 concurrency sanitizer: enabled 2024/02/04 04:04:16 devlink PCI setup: PCI device 0000:00:10.0 is not available 2024/02/04 04:04:16 NIC VF setup: PCI device 0000:00:11.0 is not available 2024/02/04 04:04:16 USB emulation: /dev/raw-gadget does not exist 2024/02/04 04:04:16 hci packet injection: /dev/vhci does not exist 2024/02/04 04:04:16 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2024/02/04 04:04:16 802.15.4 emulation: enabled 2024/02/04 04:04:16 swap file: enabled 2024/02/04 04:04:16 fetching corpus: 0, signal 0/0 (executing program) 2024/02/04 04:04:16 fetching corpus: 0, signal 0/0 (executing program) 2024/02/04 04:04:17 starting 5 fuzzer processes [ 80.323799][ T27] audit: type=1400 audit(1707019457.464:185): avc: denied { read } for pid=3434 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.345252][ T27] audit: type=1400 audit(1707019457.464:186): avc: denied { open } for pid=3434 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.368796][ T27] audit: type=1400 audit(1707019457.464:187): avc: denied { mounton } for pid=3434 comm="syz-executor.0" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.721295][ T3436] chnl_net:caif_netlink_parms(): no params data found [ 80.730005][ T3442] chnl_net:caif_netlink_parms(): no params data found [ 80.744605][ T3434] chnl_net:caif_netlink_parms(): no params data found [ 80.773627][ T3453] chnl_net:caif_netlink_parms(): no params data found [ 80.805112][ T3455] chnl_net:caif_netlink_parms(): no params data found [ 80.836572][ T3436] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.843637][ T3436] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.851085][ T3436] bridge_slave_0: entered allmulticast mode [ 80.857501][ T3436] bridge_slave_0: entered promiscuous mode [ 80.881358][ T3436] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.888507][ T3436] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.895816][ T3436] bridge_slave_1: entered allmulticast mode [ 80.902048][ T3436] bridge_slave_1: entered promiscuous mode [ 80.918423][ T3442] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.925517][ T3442] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.932578][ T3442] bridge_slave_0: entered allmulticast mode [ 80.939670][ T3442] bridge_slave_0: entered promiscuous mode [ 80.946272][ T3442] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.953297][ T3442] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.961407][ T3442] bridge_slave_1: entered allmulticast mode [ 80.967897][ T3442] bridge_slave_1: entered promiscuous mode [ 80.991581][ T3453] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.998668][ T3453] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.005904][ T3453] bridge_slave_0: entered allmulticast mode [ 81.012157][ T3453] bridge_slave_0: entered promiscuous mode [ 81.036439][ T3436] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.046494][ T3436] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.057971][ T3453] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.065022][ T3453] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.072177][ T3453] bridge_slave_1: entered allmulticast mode [ 81.078520][ T3453] bridge_slave_1: entered promiscuous mode [ 81.090606][ T3442] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.099744][ T3434] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.106934][ T3434] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.114031][ T3434] bridge_slave_0: entered allmulticast mode [ 81.120519][ T3434] bridge_slave_0: entered promiscuous mode [ 81.126999][ T3434] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.134035][ T3434] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.141329][ T3434] bridge_slave_1: entered allmulticast mode [ 81.147700][ T3434] bridge_slave_1: entered promiscuous mode [ 81.171045][ T3442] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.193512][ T3436] team0: Port device team_slave_0 added [ 81.199955][ T3436] team0: Port device team_slave_1 added [ 81.209976][ T3455] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.217060][ T3455] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.224220][ T3455] bridge_slave_0: entered allmulticast mode [ 81.230617][ T3455] bridge_slave_0: entered promiscuous mode [ 81.238182][ T3453] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.248287][ T3453] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.262259][ T3442] team0: Port device team_slave_0 added [ 81.269179][ T3434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.282365][ T3455] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.289492][ T3455] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.296812][ T3455] bridge_slave_1: entered allmulticast mode [ 81.303071][ T3455] bridge_slave_1: entered promiscuous mode [ 81.314423][ T3442] team0: Port device team_slave_1 added [ 81.324404][ T3434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.351905][ T3453] team0: Port device team_slave_0 added [ 81.361950][ T3442] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.368978][ T3442] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.394861][ T3442] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.410126][ T3436] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.417095][ T3436] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.442981][ T3436] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.454154][ T3436] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.461119][ T3436] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.487003][ T3436] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.498979][ T3455] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.508708][ T3453] team0: Port device team_slave_1 added [ 81.514571][ T3442] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.521532][ T3442] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.547491][ T3442] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.564837][ T3434] team0: Port device team_slave_0 added [ 81.573623][ T3455] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.597621][ T3434] team0: Port device team_slave_1 added [ 81.613751][ T3455] team0: Port device team_slave_0 added [ 81.619836][ T3453] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.626954][ T3453] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.653047][ T3453] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.664380][ T3453] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.671461][ T3453] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.697345][ T3453] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.716741][ T3434] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.723691][ T3434] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.749648][ T3434] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.769137][ T3455] team0: Port device team_slave_1 added [ 81.787178][ T3434] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.794128][ T3434] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.820178][ T3434] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.834568][ T3436] hsr_slave_0: entered promiscuous mode [ 81.840671][ T3436] hsr_slave_1: entered promiscuous mode [ 81.855914][ T3455] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 81.862865][ T3455] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.888855][ T3455] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 81.902022][ T3442] hsr_slave_0: entered promiscuous mode [ 81.908063][ T3442] hsr_slave_1: entered promiscuous mode [ 81.913834][ T3442] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 81.921403][ T3442] Cannot create hsr debugfs directory [ 81.935348][ T3455] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 81.942325][ T3455] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 81.968298][ T3455] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 81.998245][ T3453] hsr_slave_0: entered promiscuous mode [ 82.004386][ T3453] hsr_slave_1: entered promiscuous mode [ 82.010556][ T3453] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 82.018150][ T3453] Cannot create hsr debugfs directory [ 82.036015][ T3434] hsr_slave_0: entered promiscuous mode [ 82.042029][ T3434] hsr_slave_1: entered promiscuous mode [ 82.047877][ T3434] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 82.055406][ T3434] Cannot create hsr debugfs directory [ 82.078567][ T3455] hsr_slave_0: entered promiscuous mode [ 82.084600][ T3455] hsr_slave_1: entered promiscuous mode [ 82.090372][ T3455] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 82.097929][ T3455] Cannot create hsr debugfs directory [ 82.194021][ T3442] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 82.211849][ T3442] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 82.220733][ T3442] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 82.231241][ T3442] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 82.278994][ T3436] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.296988][ T3436] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.330922][ T3436] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.346529][ T3442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.353722][ T3436] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.410512][ T3442] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.441233][ T3093] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.448346][ T3093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.460324][ T3093] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.467461][ T3093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.571719][ T3436] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.586148][ T3436] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.600945][ T3074] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.608072][ T3074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.629651][ T3442] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.642857][ T3436] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 82.653265][ T3436] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 82.671803][ T3434] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.682180][ T3074] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.689405][ T3074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.706775][ T3434] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.719008][ T3434] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.729896][ T3434] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.775216][ T3453] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 82.797576][ T3453] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 82.816999][ T3453] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 82.826393][ T3453] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 82.847302][ T3436] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.884779][ T3455] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 82.898866][ T3455] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 82.911289][ T3455] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 82.927224][ T3434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.944816][ T3455] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 82.971449][ T3434] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.000291][ T3442] veth0_vlan: entered promiscuous mode [ 83.018321][ T3436] veth0_vlan: entered promiscuous mode [ 83.057320][ T3074] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.064460][ T3074] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.073628][ T3074] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.080758][ T3074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.098008][ T3436] veth1_vlan: entered promiscuous mode [ 83.110008][ T3453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.120204][ T3442] veth1_vlan: entered promiscuous mode [ 83.154967][ T3442] veth0_macvtap: entered promiscuous mode [ 83.163274][ T3436] veth0_macvtap: entered promiscuous mode [ 83.179832][ T3442] veth1_macvtap: entered promiscuous mode [ 83.190455][ T3436] veth1_macvtap: entered promiscuous mode [ 83.199493][ T3453] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.227700][ T3442] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 83.251731][ T3095] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.258850][ T3095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.269745][ T3436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 83.280309][ T3436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 83.291712][ T3436] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 83.307443][ T3455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.315226][ T3442] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 83.324688][ T3442] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.333539][ T3442] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.342377][ T3442] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.351217][ T3442] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.363524][ T966] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.370652][ T966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.380504][ T3436] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 83.391014][ T3436] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 83.401878][ T3436] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 83.413489][ T3434] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.426273][ T3436] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.435015][ T3436] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.443751][ T3436] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.452483][ T3436] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.484632][ T3453] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.495197][ T3453] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.516803][ T3455] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.542406][ T3529] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.549525][ T3529] bridge0: port 1(bridge_slave_0) entered forwarding state 04:04:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "9c9b8a71485251a72d7d4c666c47175fe01787583363f848a6b76132912a6ed0", "772e43950c5255d41cb8dc8dbe8c32a9897dd70bdb1be676482545789b15b551"}}}]}, 0x268}}, 0x0) 04:04:20 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) 04:04:20 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) [ 83.620905][ T3656] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.628031][ T3656] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.658206][ T3453] 8021q: adding VLAN 0 to HW filter on device batadv0 04:04:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "9c9b8a71485251a72d7d4c666c47175fe01787583363f848a6b76132912a6ed0", "772e43950c5255d41cb8dc8dbe8c32a9897dd70bdb1be676482545789b15b551"}}}]}, 0x268}}, 0x0) 04:04:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "9c9b8a71485251a72d7d4c666c47175fe01787583363f848a6b76132912a6ed0", "772e43950c5255d41cb8dc8dbe8c32a9897dd70bdb1be676482545789b15b551"}}}]}, 0x268}}, 0x0) [ 83.694461][ T3455] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 83.694998][ T27] audit: type=1400 audit(1707019460.834:188): avc: denied { write } for pid=3676 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 83.705033][ T3455] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 04:04:20 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) 04:04:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "9c9b8a71485251a72d7d4c666c47175fe01787583363f848a6b76132912a6ed0", "772e43950c5255d41cb8dc8dbe8c32a9897dd70bdb1be676482545789b15b551"}}}]}, 0x268}}, 0x0) 04:04:20 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "9c9b8a71485251a72d7d4c666c47175fe01787583363f848a6b76132912a6ed0", "772e43950c5255d41cb8dc8dbe8c32a9897dd70bdb1be676482545789b15b551"}}}]}, 0x268}}, 0x0) 04:04:21 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) 04:04:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "9c9b8a71485251a72d7d4c666c47175fe01787583363f848a6b76132912a6ed0", "772e43950c5255d41cb8dc8dbe8c32a9897dd70bdb1be676482545789b15b551"}}}]}, 0x268}}, 0x0) [ 83.802214][ T3434] veth0_vlan: entered promiscuous mode [ 83.836747][ T3434] veth1_vlan: entered promiscuous mode 04:04:21 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) 04:04:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)={0x268, 0x0, 0x5, 0x401, 0x0, 0x0, {}, [{{0x254, 0x1, {{}, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', "9c9b8a71485251a72d7d4c666c47175fe01787583363f848a6b76132912a6ed0", "772e43950c5255d41cb8dc8dbe8c32a9897dd70bdb1be676482545789b15b551"}}}]}, 0x268}}, 0x0) [ 83.896391][ T3434] veth0_macvtap: entered promiscuous mode [ 83.923570][ T3434] veth1_macvtap: entered promiscuous mode 04:04:21 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) 04:04:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) [ 83.961110][ T3453] veth0_vlan: entered promiscuous mode [ 83.989585][ T3434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 84.000183][ T3434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 04:04:21 executing program 4: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) [ 84.010057][ T3434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 84.020570][ T3434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.036922][ T3434] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 84.045219][ T3434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 84.055893][ T3434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.065776][ T3434] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 84.076237][ T3434] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.093997][ T3434] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 84.103136][ T3434] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 04:04:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) [ 84.112119][ T3434] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.120884][ T3434] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.129622][ T3434] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.142448][ T3453] veth1_vlan: entered promiscuous mode 04:04:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 04:04:21 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000900)="2600000022004701050007008980e8ff02006d20002b1f00c0e9f7094a51f10101033500b088", 0x26) recvfrom$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x20004788) [ 84.155796][ T3455] 8021q: adding VLAN 0 to HW filter on device batadv0 04:04:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) 04:04:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) [ 84.220411][ T3453] veth0_macvtap: entered promiscuous mode [ 84.247389][ T3453] veth1_macvtap: entered promiscuous mode [ 84.263410][ T3768] sctp: [Deprecated]: syz-executor.0 (pid 3768) Use of struct sctp_assoc_value in delayed_ack socket option. [ 84.263410][ T3768] Use struct sctp_sack_info instead [ 84.265492][ T27] audit: type=1400 audit(1707019461.424:189): avc: denied { prog_load } for pid=3763 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 84.290317][ T3453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 84.299498][ T27] audit: type=1400 audit(1707019461.424:190): avc: denied { bpf } for pid=3763 comm="syz-executor.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 84.309891][ T3453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.330637][ T27] audit: type=1400 audit(1707019461.424:191): avc: denied { getopt } for pid=3767 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 04:04:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) [ 84.345653][ T27] audit: type=1400 audit(1707019461.494:192): avc: denied { perfmon } for pid=3763 comm="syz-executor.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 84.360293][ T3453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 84.360309][ T3453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.360319][ T3453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 04:04:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) [ 84.360330][ T3453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.373030][ T3453] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 84.435084][ T3453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 84.445626][ T3453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.455546][ T3453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 04:04:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) [ 84.466136][ T3453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.476134][ T3453] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 84.484161][ T3782] sctp: [Deprecated]: syz-executor.0 (pid 3782) Use of struct sctp_assoc_value in delayed_ack socket option. [ 84.484161][ T3782] Use struct sctp_sack_info instead [ 84.486719][ T3453] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 04:04:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) [ 84.524597][ T3453] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 84.557745][ T3453] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 04:04:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) 04:04:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) [ 84.563906][ T3791] sctp: [Deprecated]: syz-executor.0 (pid 3791) Use of struct sctp_assoc_value in delayed_ack socket option. [ 84.563906][ T3791] Use struct sctp_sack_info instead [ 84.566514][ T3453] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.566548][ T3453] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.566621][ T3453] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 04:04:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) [ 84.622564][ T3795] sctp: [Deprecated]: syz-executor.1 (pid 3795) Use of struct sctp_assoc_value in delayed_ack socket option. [ 84.622564][ T3795] Use struct sctp_sack_info instead [ 84.683866][ T3805] sctp: [Deprecated]: syz-executor.1 (pid 3805) Use of struct sctp_assoc_value in delayed_ack socket option. [ 84.683866][ T3805] Use struct sctp_sack_info instead [ 84.716909][ T3807] sctp: [Deprecated]: syz-executor.0 (pid 3807) Use of struct sctp_assoc_value in delayed_ack socket option. [ 84.716909][ T3807] Use struct sctp_sack_info instead 04:04:21 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) [ 84.733505][ T3455] veth0_vlan: entered promiscuous mode [ 84.751269][ T3455] veth1_vlan: entered promiscuous mode [ 84.766646][ T3811] sctp: [Deprecated]: syz-executor.1 (pid 3811) Use of struct sctp_assoc_value in delayed_ack socket option. [ 84.766646][ T3811] Use struct sctp_sack_info instead 04:04:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x80}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc3}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 84.780385][ T3455] veth0_macvtap: entered promiscuous mode 04:04:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x80}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc3}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 84.823562][ T3455] veth1_macvtap: entered promiscuous mode [ 84.839756][ T27] audit: type=1400 audit(1707019462.004:193): avc: denied { map_create } for pid=3819 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 84.883380][ T27] audit: type=1400 audit(1707019462.024:194): avc: denied { map_read map_write } for pid=3819 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 84.915802][ T3455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 04:04:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x80}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc3}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) [ 84.926293][ T3455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.936130][ T3455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 84.946682][ T3455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.956511][ T3455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 84.966957][ T3455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 84.976847][ T3455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 84.987288][ T3455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 85.004839][ T3455] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 85.023050][ T3455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 04:04:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x80}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc3}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 04:04:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 85.033663][ T3455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 85.043639][ T3455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 85.054201][ T3455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 85.064092][ T3455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 04:04:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x80}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc3}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 04:04:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) 04:04:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x80}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc3}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 04:04:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events.local\x00', 0x275a, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000300)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x5, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000200)='syzkaller\x00', 0xa, 0xff9, &(0x7f0000002300)=""/4089}, 0x90) [ 85.075060][ T3455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 85.085238][ T3455] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 85.096580][ T3455] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 85.110558][ T3455] batman_adv: batadv0: Interface activated: batadv_slave_1 04:04:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 85.151608][ T3455] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.160521][ T3455] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.169366][ T3455] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.178162][ T3455] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 04:04:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8, 0x80}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0xc3}}]}, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 04:04:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:22 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 04:04:22 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) [ 85.545275][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 85.545288][ T27] audit: type=1400 audit(1707019462.704:197): avc: denied { ioctl } for pid=3926 comm="syz-executor.2" path="socket:[5481]" dev="sockfs" ino=5481 ioctlcmd=0x48d4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 04:04:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 04:04:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8040, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20008014) 04:04:23 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 04:04:23 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 04:04:23 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 04:04:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x62, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:23 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 04:04:23 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 04:04:23 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 04:04:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x62, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:23 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, 0x0) 04:04:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x62, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) [ 86.116674][ T27] audit: type=1400 audit(1707019463.274:198): avc: denied { write } for pid=4025 comm="syz-executor.1" name="001" dev="devtmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 04:04:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x62, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x62, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x62, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:23 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x73, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000000)={0x62, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}) 04:04:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 04:04:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 1: unshare(0x8020600) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) 04:04:23 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r1, 0x741, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}}, 0x20}}, 0x0) 04:04:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x16, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 04:04:23 executing program 1: unshare(0x8020600) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) 04:04:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) [ 86.411404][ T27] audit: type=1400 audit(1707019463.574:199): avc: denied { bind } for pid=4085 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 04:04:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 04:04:24 executing program 1: unshare(0x8020600) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) 04:04:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 04:04:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x16, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 04:04:24 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x5, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 04:04:24 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 04:04:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x16, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 04:04:24 executing program 1: unshare(0x8020600) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) 04:04:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x16, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 04:04:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x16, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 04:04:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x16, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 04:04:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x16, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) 04:04:24 executing program 1: unshare(0x8020600) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) 04:04:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000100)=0xb0) 04:04:24 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 1: unshare(0x8020600) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) 04:04:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000100)=0xb0) 04:04:24 executing program 1: unshare(0x8020600) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc) 04:04:24 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000100)=0xb0) 04:04:24 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000100)=0xb0) 04:04:24 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000100)=0xb0) 04:04:24 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000100)=0xb0) 04:04:24 executing program 1: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:24 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/84}, 0x5c, 0x9253d600324e94fd, 0x0) 04:04:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) [ 87.190945][ T27] audit: type=1400 audit(1707019464.354:200): avc: denied { create } for pid=4194 comm="syz-executor.1" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 87.223782][ T27] audit: type=1400 audit(1707019464.384:201): avc: denied { block_suspend } for pid=4198 comm="syz-executor.2" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 04:04:24 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @loopback}}}}, &(0x7f0000000100)=0xb0) 04:04:24 executing program 1: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:24 executing program 1: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:24 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:24 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:24 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:24 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:25 executing program 1: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:25 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:25 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:25 executing program 2: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 1: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:25 executing program 2: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 1: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:25 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20001007}) 04:04:25 executing program 4: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 2: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 0: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:25 executing program 1: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 4: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0xec, 0x2, 0x1, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x1}, @CTA_SYNPROXY={0xfffffffffffffffb, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xfff}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x81}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xde4b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x80000}, @CTA_SYNPROXY_ITS={0x8}]}, @CTA_TUPLE_REPLY={0x80, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @dev}}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xf, 0x1, 'tftp-20000\x00'}}]}, 0xec}, 0x1, 0x0, 0x0, 0x8010}, 0x20008004) 04:04:25 executing program 0: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 0: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) 04:04:25 executing program 4: r0 = memfd_secret(0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x10000000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) r1 = memfd_secret(0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) [ 88.021058][ T27] audit: type=1400 audit(1707019465.184:202): avc: denied { open } for pid=4250 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 88.028371][ T4256] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.2'. [ 88.040657][ T27] audit: type=1400 audit(1707019465.184:203): avc: denied { kernel } for pid=4250 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 04:04:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) [ 88.104378][ C1] hrtimer: interrupt took 49911 ns [ 88.116314][ T27] audit: type=1400 audit(1707019465.244:204): avc: denied { create } for pid=4250 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 04:04:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0xec, 0x2, 0x1, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x1}, @CTA_SYNPROXY={0xfffffffffffffffb, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xfff}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x81}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xde4b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x80000}, @CTA_SYNPROXY_ITS={0x8}]}, @CTA_TUPLE_REPLY={0x80, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @dev}}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xf, 0x1, 'tftp-20000\x00'}}]}, 0xec}, 0x1, 0x0, 0x0, 0x8010}, 0x20008004) 04:04:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) [ 88.136631][ T27] audit: type=1400 audit(1707019465.254:205): avc: denied { sys_admin } for pid=4250 comm="syz-executor.3" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 88.158044][ T27] audit: type=1400 audit(1707019465.274:206): avc: denied { getopt } for pid=4259 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 04:04:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0xec, 0x2, 0x1, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x1}, @CTA_SYNPROXY={0xfffffffffffffffb, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xfff}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x81}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xde4b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x80000}, @CTA_SYNPROXY_ITS={0x8}]}, @CTA_TUPLE_REPLY={0x80, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @dev}}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xf, 0x1, 'tftp-20000\x00'}}]}, 0xec}, 0x1, 0x0, 0x0, 0x8010}, 0x20008004) 04:04:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) [ 88.195374][ T4274] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.2'. 04:04:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) [ 88.251435][ T4283] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.2'. 04:04:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) ioprio_set$pid(0x0, 0x0, 0x2000) 04:04:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0xec, 0x2, 0x1, 0x301, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x1}, @CTA_SYNPROXY={0xfffffffffffffffb, 0x18, 0x0, 0x1, [@CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x200}, @CTA_SYNPROXY_ISN={0x8, 0x1, 0x1, 0x0, 0xfff}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x81}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0xde4b}, @CTA_SYNPROXY_ITS={0x8, 0x2, 0x1, 0x0, 0x80000}, @CTA_SYNPROXY_ITS={0x8}]}, @CTA_TUPLE_REPLY={0x80, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @dev}}}]}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xf, 0x1, 'tftp-20000\x00'}}]}, 0xec}, 0x1, 0x0, 0x0, 0x8010}, 0x20008004) 04:04:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@newqdisc={0x24, 0x76, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, {0xb, 0xc}}}, 0x24}}, 0x0) 04:04:25 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@newqdisc={0x24, 0x76, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, {0xb, 0xc}}}, 0x24}}, 0x0) 04:04:25 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:25 executing program 2: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) [ 88.340397][ T4298] netlink: 208 bytes leftover after parsing attributes in process `syz-executor.2'. 04:04:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@newqdisc={0x24, 0x76, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, {0xb, 0xc}}}, 0x24}}, 0x0) 04:04:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@newqdisc={0x24, 0x76, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, {0xb, 0xc}}}, 0x24}}, 0x0) 04:04:25 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:25 executing program 2: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:25 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:25 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:25 executing program 2: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:25 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:25 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:25 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:26 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:26 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:26 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:27 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:27 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:27 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:27 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:28 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_settime(0x0, &(0x7f0000000080)={r0, r1+60000000}) 04:04:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:29 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:30 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:32 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:32 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:32 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 3: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:33 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:33 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000008c0)={@cgroup, 0x24, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000740)=[0x0], &(0x7f0000000780)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000002240)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRES64, @ANYRES8], 0x32600) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000003340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000002bc0)={&(0x7f0000002800)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000002b00), 0x0, &(0x7f0000002b80)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000020c0)=@bloom_filter={0x1e, 0x10001, 0x0, 0x20, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x9}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002dc0)='cgroup.events\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x53}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000980)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000680)=""/159}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b00), 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sys_enter\x00', r5}, 0x10) r6 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=@base={0x1a, 0x86, 0x660458e7, 0x4000000, 0x408, r6, 0x69, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0x2, &(0x7f00000007c0)=ANY=[@ANYBLOB="37586f1e3ff8a5707b6a6a6fb91b7b24f0863bcd3fd86983f9ff99e73ad2bd1823bb5b79ab5e9ceeef158757981ebc0d1600100000000000007d2e62be026bd26fa3", @ANYRES32, @ANYRES8], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0xc2e00, 0x10, '\x00', 0x0, 0x19, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x3, 0x1000}, 0x10, 0x0, r4, 0x3d, &(0x7f0000000540)}, 0x90) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = open(&(0x7f0000000080)='./bus\x00', 0x145042, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000280)) fallocate(r7, 0x8, 0x0, 0xffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r7, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000340)=[{}], 0x8, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r2, 0x0, 0x804) recvmsg$unix(r3, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c00), 0x0, &(0x7f0000002c40)}, 0x2000) 04:04:33 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 3: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 3: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 1: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 2: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 0: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@newqdisc={0x24, 0x76, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, {0xb, 0xc}}}, 0x24}}, 0x0) 04:04:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@newqdisc={0x24, 0x76, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, {0xb, 0xc}}}, 0x24}}, 0x0) 04:04:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@newqdisc={0x24, 0x76, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, {0xb, 0xc}}}, 0x24}}, 0x0) 04:04:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) 04:04:33 executing program 3: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 2: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:33 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) [ 95.879416][ T27] kauditd_printk_skb: 2 callbacks suppressed [ 95.879429][ T27] audit: type=1400 audit(1707019473.631:209): avc: denied { bind } for pid=4740 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 04:04:33 executing program 2: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = syz_io_uring_setup(0x24f9, &(0x7f0000000080)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000140)=0x0) r5 = syz_io_uring_setup(0x3840, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f0000000180)) syz_io_uring_submit(r6, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x4}) io_uring_enter(r3, 0xa3d, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) fallocate(r5, 0x16, 0xf3, 0xfb) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 04:04:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) 04:04:33 executing program 3: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) [ 95.908463][ T27] audit: type=1400 audit(1707019473.661:210): avc: denied { write } for pid=4740 comm="syz-executor.0" path="socket:[9355]" dev="sockfs" ino=9355 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 95.934326][ T27] audit: type=1400 audit(1707019473.661:211): avc: denied { connect } for pid=4740 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 95.954396][ T27] audit: type=1400 audit(1707019473.661:212): avc: denied { setopt } for pid=4740 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 04:04:33 executing program 3: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) 04:04:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) [ 95.974465][ T27] audit: type=1400 audit(1707019473.661:213): avc: denied { read } for pid=4740 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 96.001367][ T27] audit: type=1400 audit(1707019473.691:214): avc: denied { lock } for pid=4740 comm="syz-executor.0" path="socket:[9355]" dev="sockfs" ino=9355 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 04:04:33 executing program 3: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) [ 96.063836][ T4757] ================================================================== [ 96.071955][ T4757] BUG: KCSAN: data-race in __filemap_remove_folio / filemap_write_and_wait_range [ 96.081093][ T4757] [ 96.083422][ T4757] read-write to 0xffff8881069ce778 of 8 bytes by task 4743 on cpu 0: [ 96.091490][ T4757] __filemap_remove_folio+0x1d1/0x2d0 [ 96.096890][ T4757] __remove_mapping+0x341/0x460 [ 96.101768][ T4757] remove_mapping+0x22/0x90 [ 96.106303][ T4757] mapping_try_invalidate+0x27d/0x3d0 04:04:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) 04:04:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) 04:04:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) [ 96.111696][ T4757] invalidate_mapping_pages+0x27/0x30 [ 96.117088][ T4757] ext4_file_write_iter+0xda1/0xe10 [ 96.122314][ T4757] iter_file_splice_write+0x5de/0x950 [ 96.127780][ T4757] direct_splice_actor+0x167/0x2c0 [ 96.132901][ T4757] splice_direct_to_actor+0x2fb/0x660 [ 96.138285][ T4757] do_splice_direct+0xd7/0x150 [ 96.143060][ T4757] do_sendfile+0x3b9/0x960 [ 96.147485][ T4757] __x64_sys_sendfile64+0x110/0x150 [ 96.152698][ T4757] do_syscall_64+0xcd/0x1d0 [ 96.157210][ T4757] entry_SYSCALL_64_after_hwframe+0x63/0x6b 04:04:33 executing program 4: r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) write$binfmt_aout(r2, &(0x7f0000000480)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYBLOB="d3dbb5fd01e235ac1611571fd555169ee0ad0d0af3a1aaf064c1caab7885000000000000000000000000000018e85c28cd67c1cfc2c3972fea8be7ace6569038b612fb78588bdcbfcd61f29133980a9538b1c86a80529f0ae2918ea2542379cf"], 0x10b) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000005, 0x12, r2, 0x0) r3 = memfd_create(&(0x7f00000005c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xac \xe8\xb6\xdf\x16J\xab\xecC\xe2{\xfd\x8a\xb4\x8e\x9c\xfb\xf6\xe9\xd8]B6)\x9f\x9cR\xae\x12G\xd8\xa4y\xef\x02?\xf2\xe7}\ra\x97F', 0x0) copy_file_range(r1, 0x0, r3, &(0x7f0000000080), 0x0, 0x0) [ 96.163119][ T4757] [ 96.165446][ T4757] read to 0xffff8881069ce778 of 8 bytes by task 4757 on cpu 1: [ 96.173003][ T4757] filemap_write_and_wait_range+0x51/0x210 [ 96.178830][ T4757] kiocb_write_and_wait+0x79/0x110 [ 96.183954][ T4757] __iomap_dio_rw+0x4fe/0x1090 [ 96.188734][ T4757] iomap_dio_rw+0x40/0x90 [ 96.193075][ T4757] ext4_file_read_iter+0x21c/0x2a0 [ 96.198200][ T4757] copy_splice_read+0x39f/0x5d0 [ 96.203057][ T4757] splice_direct_to_actor+0x288/0x660 [ 96.208431][ T4757] do_splice_direct+0xd7/0x150 04:04:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) [ 96.213197][ T4757] do_sendfile+0x3b9/0x960 [ 96.217606][ T4757] __x64_sys_sendfile64+0x110/0x150 [ 96.222806][ T4757] do_syscall_64+0xcd/0x1d0 [ 96.227310][ T4757] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 96.233194][ T4757] [ 96.235516][ T4757] value changed: 0x0000000000000009 -> 0x0000000000000000 [ 96.242612][ T4757] [ 96.244941][ T4757] Reported by Kernel Concurrency Sanitizer on: [ 96.251088][ T4757] CPU: 1 PID: 4757 Comm: syz-executor.0 Not tainted 6.8.0-rc2-syzkaller-00419-gb555d191561a #0 04:04:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) [ 96.261458][ T4757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 96.271519][ T4757] ================================================================== 04:04:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0xffe6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0x1b) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000001) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x400000001) 04:04:34 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) [ 97.321349][ T4813] ================================================================== [ 97.329477][ T4813] BUG: KCSAN: data-race in xas_clear_mark / xas_find_marked [ 97.336775][ T4813] [ 97.339100][ T4813] read-write to 0xffff888106b08480 of 8 bytes by task 4810 on cpu 1: [ 97.347166][ T4813] xas_clear_mark+0x8c/0x180 [ 97.351765][ T4813] __folio_start_writeback+0x300/0x450 [ 97.357220][ T4813] ext4_bio_write_folio+0x592/0x9a0 [ 97.362428][ T4813] ext4_do_writepages+0x139f/0x2100 [ 97.367639][ T4813] ext4_writepages+0x15e/0x2e0 [ 97.372419][ T4813] do_writepages+0x1c2/0x340 [ 97.377002][ T4813] filemap_fdatawrite_wbc+0xdb/0xf0 [ 97.382202][ T4813] file_write_and_wait_range+0xf4/0x190 [ 97.387750][ T4813] ext4_sync_file+0x133/0x6c0 [ 97.392430][ T4813] vfs_fsync_range+0x111/0x120 [ 97.397199][ T4813] ext4_buffered_write_iter+0x334/0x370 [ 97.402748][ T4813] ext4_file_write_iter+0xcee/0xe10 [ 97.407938][ T4813] iter_file_splice_write+0x5de/0x950 [ 97.413300][ T4813] direct_splice_actor+0x167/0x2c0 [ 97.418408][ T4813] splice_direct_to_actor+0x2fb/0x660 [ 97.423771][ T4813] do_splice_direct+0xd7/0x150 [ 97.428522][ T4813] do_sendfile+0x3b9/0x960 [ 97.432925][ T4813] __x64_sys_sendfile64+0x110/0x150 [ 97.438112][ T4813] do_syscall_64+0xcd/0x1d0 [ 97.442613][ T4813] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 97.448496][ T4813] [ 97.450810][ T4813] read to 0xffff888106b08480 of 8 bytes by task 4813 on cpu 0: [ 97.458337][ T4813] xas_find_marked+0x216/0x660 [ 97.463093][ T4813] find_get_entry+0x5d/0x290 [ 97.467680][ T4813] filemap_get_folios_tag+0x136/0x210 [ 97.473045][ T4813] mpage_prepare_extent_to_map+0x321/0xb70 [ 97.478853][ T4813] ext4_do_writepages+0x6ea/0x2100 [ 97.483959][ T4813] ext4_writepages+0x15e/0x2e0 [ 97.488720][ T4813] do_writepages+0x1c2/0x340 [ 97.493299][ T4813] filemap_fdatawrite_wbc+0xdb/0xf0 [ 97.498492][ T4813] filemap_write_and_wait_range+0xe0/0x210 [ 97.504291][ T4813] kiocb_invalidate_pages+0x87/0x1e0 [ 97.509569][ T4813] __iomap_dio_rw+0x5ad/0x1090 [ 97.514325][ T4813] iomap_dio_rw+0x40/0x90 [ 97.518648][ T4813] ext4_file_write_iter+0xa8a/0xe10 [ 97.523836][ T4813] iter_file_splice_write+0x5de/0x950 [ 97.529198][ T4813] direct_splice_actor+0x167/0x2c0 [ 97.534300][ T4813] splice_direct_to_actor+0x2fb/0x660 [ 97.539664][ T4813] do_splice_direct+0xd7/0x150 [ 97.544415][ T4813] do_sendfile+0x3b9/0x960 [ 97.548825][ T4813] __x64_sys_sendfile64+0x110/0x150 [ 97.554013][ T4813] do_syscall_64+0xcd/0x1d0 [ 97.558513][ T4813] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 97.564395][ T4813] [ 97.566705][ T4813] value changed: 0x0000fffc00000000 -> 0x0000ff0000000000 [ 97.573796][ T4813] [ 97.576105][ T4813] Reported by Kernel Concurrency Sanitizer on: [ 97.582237][ T4813] CPU: 0 PID: 4813 Comm: syz-executor.2 Not tainted 6.8.0-rc2-syzkaller-00419-gb555d191561a #0 [ 97.592551][ T4813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 97.602596][ T4813] ================================================================== 04:04:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) [ 97.738832][ T4813] syz-executor.2 (4813) used greatest stack depth: 9160 bytes left 04:04:35 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:36 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="260000002200470105000007000047f97e336600000000005c6f70b020002b1f000a4a51f1ee839cd53400b017ca5b4712696f4bff31f7ec23cefe70a543b1662b40d16bfd5f533bf7e0da89b9a2f5a37efca5acfc1297b616fd8fd8dab17db1db0170d5ef18d381f11cfdfeb85b6a5602dd2f59a6729f9c695604899b233c8d07b653eb256013ae5db2bfe6f06cc0b7793f1cdf651d905e13553e183788e393aa93bbb7347921e1b285d0c98d4edfa290a34aceb9398cb237a158ca6aceecc326833169dfa717364f2975a23b6013203f18383a0346b7a93d1fe28c74cb03f849adc26df6de25369a2c29e016f3641ce3e62f8a63f74304ab7e0e2f7bbd7b47", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) recvmmsg(r1, &(0x7f0000007340)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) sendmsg$IPSET_CMD_SAVE(r1, &(0x7f00000001c0)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000000806b3ff7ffdfffffffffffe040064ec000008000000051901000700002406040000070000000900020073796330000000009ba8bf060000009d0ae8a6102e249833ba653031794eda3952d007adbc5cba50fa35bbc3ea1cff070400a00c9830e1aa0174bf4c05a99c2f489e74527c9741c93b4462cba544909da36800dce12fe8e2524bd123530a58f1ed1ed69bb91684"], 0x38}, 0x1, 0x0, 0x0, 0x40800}, 0x24000000) ptrace$setopts(0x4200, r2, 0x0, 0x80000) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1, 0x4, 0x20, 0x1, r2}) sched_setscheduler(r2, 0x6, &(0x7f0000000080)) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x1, 0x0, 0x0, {{}, {}, {0xd, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'virt_wifi0\x00'}}}}}, 0x38}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, 0x0, 0x400, 0x316f, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0xfffeffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24044894}, 0x280080d4) ftruncate(r3, 0x208200) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)) r4 = socket$inet6(0xa, 0x401000000001, 0x0) close(r4) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1105042, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x1) sendfile(r4, r5, 0x0, 0xffffdffa) sendfile(r5, r4, 0x0, 0x800000a1) 04:04:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000001700)=0x4) r1 = socket(0x18, 0x5, 0x2) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000500)="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", 0x100) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x48, 0x5, 0x6, 0x500, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x48001}, 0x40001) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1,