)=@generic={0x0}, 0x18) r2 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:39 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:39 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ff", @ANYRES32=0x1], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r1, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r2 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:39 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/123, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:40 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 790.702593][ T3526] Bluetooth: hci0: command 0x0419 tx timeout 09:30:40 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ff", @ANYRES32=0x1], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r1, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r2 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:40 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/123, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 791.152263][ T3638] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 791.160603][ T3638] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:30:40 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:40 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:41 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/123, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:41 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/123, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:41 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:41 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:41 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], 0x0, 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:41 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:42 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], 0x0, 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:42 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ff", @ANYRES32=0x1], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r1, 0xffffffffffffffff]}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r2 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:42 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ff", @ANYRES32=0x1], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r1, 0xffffffffffffffff]}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r2 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:42 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], 0x0, 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:43 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:43 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], 0x0, 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:43 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:43 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 794.516152][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 794.554918][T16902] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 09:30:44 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 794.582473][T16902] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 794.597807][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:30:44 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ff", @ANYRES32=0x1], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[r1, 0xffffffffffffffff]}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r2 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:44 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:44 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:44 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, 0x0, &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000000cc0)=[r3, r4, r5], 0x0, 0x10, 0x40}, 0x90) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r6, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r7 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r7, r8, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r7, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:45 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:45 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:45 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:45 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, 0x0, &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000000cc0)=[r3, r4, r5], 0x0, 0x10, 0x40}, 0x90) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r6, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r7 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r7, r8, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r7, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 796.518068][T26686] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 797.023550][T26686] netdevsim netdevsim1 netdevsim1: renamed from eth1 09:30:46 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:46 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, 0x0, &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000000cc0)=[r3, r4, r5], 0x0, 0x10, 0x40}, 0x90) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r6, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r7 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r7, r8, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r7, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 797.620427][T26686] netdevsim netdevsim1 netdevsim2: renamed from eth2 09:30:47 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, 0x0, &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000000cc0)=[r3, r4, r5], 0x0, 0x10, 0x40}, 0x90) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r6, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r7 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r7, r8, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r7, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:47 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 798.421127][T26686] netdevsim netdevsim1 netdevsim3: renamed from eth3 09:30:47 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:48 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:48 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000950000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 799.320301][T26686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 799.405980][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 799.432362][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 799.444198][T26686] 8021q: adding VLAN 0 to HW filter on device team0 [ 799.492567][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 799.501435][ T3565] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 799.542250][ T3565] bridge0: port 1(bridge_slave_0) entered blocking state [ 799.549359][ T3565] bridge0: port 1(bridge_slave_0) entered forwarding state 09:30:49 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, 0x0, &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r2, 0x0, &(0x7f0000000cc0)=[r3, r4, r5], 0x0, 0x10, 0x40}, 0x90) r6 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r6, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r6, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r7 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r7, r8, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r7, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 799.632293][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 799.640455][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 799.682342][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 799.690923][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 799.698250][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 799.751975][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 799.760921][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 09:30:49 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 799.823494][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 799.842627][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 799.851334][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 799.953687][ T13] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 799.979162][T26686] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 09:30:49 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 800.015695][T26686] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 800.074990][ T3526] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 800.092567][ T3526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 800.101187][ T3526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 800.162601][ T3526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 800.171175][ T3526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 800.218812][ T3526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 800.637772][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 800.647136][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 09:30:50 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000950000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 800.688531][T26686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 800.754562][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 800.763997][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 800.817513][T26686] device veth0_vlan entered promiscuous mode 09:30:50 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 800.864599][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 800.873407][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 800.902679][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 800.910673][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 800.958421][T26686] device veth1_vlan entered promiscuous mode 09:30:50 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 801.043332][T26686] device veth0_macvtap entered promiscuous mode [ 801.059825][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 801.071119][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 801.122376][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 801.131396][ T1066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 801.164864][T26686] device veth1_macvtap entered promiscuous mode [ 801.187014][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 801.195874][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 801.238650][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 09:30:50 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 801.304667][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 801.332136][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 801.424594][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 801.452832][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 801.494836][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 801.551725][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 801.581755][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 801.631575][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 801.662287][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 801.713960][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 801.751567][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 801.813252][T26686] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 801.828613][T26911] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 801.843099][T26911] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 801.866877][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 801.901856][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 801.941734][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 801.986507][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.020033][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 09:30:51 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 802.045111][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.080858][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 802.111624][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.142616][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 802.181563][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.221679][T26686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 802.261711][T26686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 802.294608][T26686] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 802.325025][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 802.352580][ T3564] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 802.364719][T26686] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 802.411590][T26686] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 802.420340][T26686] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 802.462620][T26686] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 09:30:52 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:52 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000950000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:52 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:53 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 803.922542][ T3638] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 803.922810][ T1238] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 803.933768][ T3638] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 09:30:53 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3fffe, 0x0, 0x2}, 0x0, 0x4, 0xffffffffffffffff, 0x0) 09:30:53 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 803.976004][T26911] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 803.983202][ T1238] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 804.014189][T26850] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 09:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x8, 0x8, 0x81, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x1, 0xffffffffffff8001, 0x1ff, 0x0, 0x8000000000000000, 0xcdd7, 0x6, 0x0, 0xaf, 0x0, 0xffffffffffffffe0}, 0xffffffffffffffff, 0x1, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)=':\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000030c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x415, 0x6, 0x1, 0x3, 0xffffffffffffffff, 0xffff, '\x00', r3, r4, 0x3, 0x2, 0x3}, 0x48) 09:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x8, 0x8, 0x81, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x1, 0xffffffffffff8001, 0x1ff, 0x0, 0x8000000000000000, 0xcdd7, 0x6, 0x0, 0xaf, 0x0, 0xffffffffffffffe0}, 0xffffffffffffffff, 0x1, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)=':\x00') (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000030c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) (async) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x415, 0x6, 0x1, 0x3, 0xffffffffffffffff, 0xffff, '\x00', r3, r4, 0x3, 0x2, 0x3}, 0x48) 09:30:53 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x8, 0x8, 0x81, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x1, 0xffffffffffff8001, 0x1ff, 0x0, 0x8000000000000000, 0xcdd7, 0x6, 0x0, 0xaf, 0x0, 0xffffffffffffffe0}, 0xffffffffffffffff, 0x1, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)=':\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000030c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x415, 0x6, 0x1, 0x3, 0xffffffffffffffff, 0xffff, '\x00', r3, r4, 0x3, 0x2, 0x3}, 0x48) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x8, 0x8, 0x81, 0x4, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x1, 0xffffffffffff8001, 0x1ff, 0x0, 0x8000000000000000, 0xcdd7, 0x6, 0x0, 0xaf, 0x0, 0xffffffffffffffe0}, 0xffffffffffffffff, 0x1, r0, 0x8) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)=':\x00') (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000030c0), 0x0, 0x0) (async) ioctl$TUNSETIFINDEX(r2, 0x400454da, 0x0) (async) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) (async) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x8, 0x415, 0x6, 0x1, 0x3, 0xffffffffffffffff, 0xffff, '\x00', r3, r4, 0x3, 0x2, 0x3}, 0x48) (async) 09:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 09:30:53 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 09:30:54 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:54 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 09:30:54 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000002c0)={0x8, 0x80, 0x5, 0x40, 0x5, 0x5, 0x0, 0x5, 0x50300, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x10000, 0x125, 0xffffffff, 0x4, 0xffffffffffffff80, 0x43, 0x3ff, 0x0, 0xbb, 0x0, 0xed3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8547) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x401) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000340)=0x80000000) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000140), &(0x7f0000000200)=r2}, 0x20) 09:30:54 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000002c0)={0x8, 0x80, 0x5, 0x40, 0x5, 0x5, 0x0, 0x5, 0x50300, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x10000, 0x125, 0xffffffff, 0x4, 0xffffffffffffff80, 0x43, 0x3ff, 0x0, 0xbb, 0x0, 0xed3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8547) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x401) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000340)=0x80000000) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000140), &(0x7f0000000200)=r2}, 0x20) perf_event_open$cgroup(&(0x7f00000002c0)={0x8, 0x80, 0x5, 0x40, 0x5, 0x5, 0x0, 0x5, 0x50300, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x10000, 0x125, 0xffffffff, 0x4, 0xffffffffffffff80, 0x43, 0x3ff, 0x0, 0xbb, 0x0, 0xed3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8547) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x401) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000340)=0x80000000) (async) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x18) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000140), &(0x7f0000000200)=r2}, 0x20) (async) 09:30:54 executing program 1: r0 = perf_event_open$cgroup(&(0x7f00000002c0)={0x8, 0x80, 0x5, 0x40, 0x5, 0x5, 0x0, 0x5, 0x50300, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000280), 0x4}, 0x10000, 0x125, 0xffffffff, 0x4, 0xffffffffffffff80, 0x43, 0x3ff, 0x0, 0xbb, 0x0, 0xed3}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8547) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x401) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000340)=0x80000000) (async) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@generic={&(0x7f0000000180)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r1}, &(0x7f0000000140), &(0x7f0000000200)=r2}, 0x20) 09:30:54 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:30:54 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:30:54 executing program 1: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x1ff) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:30:54 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1a) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x33, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf9ef, 0x0, 0x0, 0x0, 0x9}, [@generic={0xfe, 0x5, 0x1, 0x8, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x9e0}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x867}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}]}, &(0x7f0000000280)='syzkaller\x00', 0x3f, 0xa1, &(0x7f00000002c0)=""/161, 0x41100, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x1, 0xd, 0xc6a, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff], 0x0, 0x10, 0x280000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000080)='sched_process_exec\x00', r1}, 0x10) 09:30:55 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1a) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1a) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x33, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf9ef, 0x0, 0x0, 0x0, 0x9}, [@generic={0xfe, 0x5, 0x1, 0x8, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x9e0}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x867}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}]}, &(0x7f0000000280)='syzkaller\x00', 0x3f, 0xa1, &(0x7f00000002c0)=""/161, 0x41100, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x1, 0xd, 0xc6a, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff], 0x0, 0x10, 0x280000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000080)='sched_process_exec\x00', r1}, 0x10) 09:30:55 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1a) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x33, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf9ef, 0x0, 0x0, 0x0, 0x9}, [@generic={0xfe, 0x5, 0x1, 0x8, 0x5}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, 0x1}}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x9e0}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x867}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}}]}, &(0x7f0000000280)='syzkaller\x00', 0x3f, 0xa1, &(0x7f00000002c0)=""/161, 0x41100, 0x21, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x1, 0xd, 0xc6a, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[0xffffffffffffffff], 0x0, 0x10, 0x280000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000080)='sched_process_exec\x00', r1}, 0x10) 09:30:55 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:55 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x81, 0xf7, 0x1, 0x0, 0x804, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x6}, 0x400, 0x0, 0xa20, 0x6, 0x4, 0x5, 0x3, 0x0, 0x8, 0x0, 0xf5ad}, 0x0, 0xe, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x1f, 0xec, 0x4, 0x0, 0x2e, 0x11020, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0xfffffffffffffff9}, 0x108180, 0xe2c6, 0x7, 0x3, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x8, 0x81, 0x8, 0x40, 0x0, 0x6, 0x100, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x4, 0x8001}, 0x10, 0x8000000000000000, 0x8, 0x9, 0xffffffffffffff81, 0x8, 0x0, 0x0, 0x9, 0x0, 0x81}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6d) 09:30:55 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x81, 0xf7, 0x1, 0x0, 0x804, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x6}, 0x400, 0x0, 0xa20, 0x6, 0x4, 0x5, 0x3, 0x0, 0x8, 0x0, 0xf5ad}, 0x0, 0xe, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) (async) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) (async) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) (async, rerun: 32) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async, rerun: 32) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x1f, 0xec, 0x4, 0x0, 0x2e, 0x11020, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0xfffffffffffffff9}, 0x108180, 0xe2c6, 0x7, 0x3, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x8, 0x81, 0x8, 0x40, 0x0, 0x6, 0x100, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x4, 0x8001}, 0x10, 0x8000000000000000, 0x8, 0x9, 0xffffffffffffff81, 0x8, 0x0, 0x0, 0x9, 0x0, 0x81}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6d) 09:30:55 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x81, 0xf7, 0x1, 0x0, 0x804, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x6}, 0x400, 0x0, 0xa20, 0x6, 0x4, 0x5, 0x3, 0x0, 0x8, 0x0, 0xf5ad}, 0x0, 0xe, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x1f, 0xec, 0x4, 0x0, 0x2e, 0x11020, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0xfffffffffffffff9}, 0x108180, 0xe2c6, 0x7, 0x3, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x8, 0x81, 0x8, 0x40, 0x0, 0x6, 0x100, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x4, 0x8001}, 0x10, 0x8000000000000000, 0x8, 0x9, 0xffffffffffffff81, 0x8, 0x0, 0x0, 0x9, 0x0, 0x81}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6d) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5, 0x81, 0xf7, 0x1, 0x0, 0x804, 0x4000, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x6}, 0x400, 0x0, 0xa20, 0x6, 0x4, 0x5, 0x3, 0x0, 0x8, 0x0, 0xf5ad}, 0x0, 0xe, 0xffffffffffffffff, 0x3) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x6) (async) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x1f, 0xec, 0x4, 0x0, 0x2e, 0x11020, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x5, 0xfffffffffffffff9}, 0x108180, 0xe2c6, 0x7, 0x3, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xf, r0, 0x9) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000180)={0x4, 0x80, 0x8, 0x81, 0x8, 0x40, 0x0, 0x6, 0x100, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x4, 0x8001}, 0x10, 0x8000000000000000, 0x8, 0x9, 0xffffffffffffff81, 0x8, 0x0, 0x0, 0x9, 0x0, 0x81}) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6d) (async) 09:30:55 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:55 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:55 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:55 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400800, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000180)={r0}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x100) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xde, &(0x7f0000000240)=""/222, 0x40f00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x1, 0x3, 0x7, 0x3}, {0x1, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x1, 0x6}]}, 0x90) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000004c0)=r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r1}, 0x18) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r3, 0x4) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:30:55 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400800, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000180)={r0}) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000180)={r0}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x100) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xde, &(0x7f0000000240)=""/222, 0x40f00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x1, 0x3, 0x7, 0x3}, {0x1, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x1, 0x6}]}, 0x90) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xde, &(0x7f0000000240)=""/222, 0x40f00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x1, 0x3, 0x7, 0x3}, {0x1, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x1, 0x6}]}, 0x90) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000004c0)=r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r1}, 0x18) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r3, 0x4) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:30:55 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400800, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000180)={r0}) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x100) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xde, &(0x7f0000000240)=""/222, 0x40f00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x1, 0x3, 0x7, 0x3}, {0x1, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x1, 0x6}]}, 0x90) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000004c0)=r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r1}, 0x18) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r3, 0x4) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400800, 0x0) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000180)={r0}) (async) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x100) (async) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000040)) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x5, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x200}, [@map_fd={0x18, 0xb, 0x1, 0x0, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0xde, &(0x7f0000000240)=""/222, 0x40f00, 0x48, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x4, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000380)=[0x1, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x1, 0x3, 0x7, 0x3}, {0x1, 0x4, 0xd, 0x3}, {0x2, 0x5, 0x1, 0x6}]}, 0x90) (async) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000004c0)=r2) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@o_path={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r1}, 0x18) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r3, 0x4) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 09:30:56 executing program 1: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0xfdd0) socketpair(0x1, 0x6, 0x3ff, &(0x7f00000000c0)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0xfffffffffffffe94) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2a, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x1, 0xb, 0xb, 0x8, 0xc, 0x1}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x5, 0x7, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_val={0x18, 0x6, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x42, 0x0, 0x0, 0x41100, 0x59, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x5, 0x8000, 0x20}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000480)=[r1], &(0x7f00000004c0)=[{0x1, 0x5, 0x7, 0x4}, {0x3, 0x4, 0x3, 0x6}, {0x1, 0x1, 0xd, 0x7}, {0x3, 0x3, 0x1, 0x7}, {0x0, 0x3, 0xa, 0x2}], 0x10, 0x9}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000026c0)={&(0x7f0000000640)="d36ba8a78aa50c424b1e9d5806c14f61104b1437efee43e3a8fe08f60b59bf8e96dcac0fff", &(0x7f0000000680)=""/4096, &(0x7f0000001680)="6ea3ad261b3ad3db1588ede40205042a723e1549faba47e11e1122e88c8f0f48369d", &(0x7f00000016c0)="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", 0x4bda}, 0x38) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={@ifindex=r2, r3, 0x8, 0x5, r1, @prog_fd=r1}, 0x20) bpf$LINK_DETACH(0x22, &(0x7f0000000100)=r0, 0xffffffffffffffdf) 09:30:56 executing program 1: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0xfdd0) socketpair(0x1, 0x6, 0x3ff, &(0x7f00000000c0)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0xfffffffffffffe94) (async) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0xfffffffffffffe94) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2a, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x1, 0xb, 0xb, 0x8, 0xc, 0x1}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x5, 0x7, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_val={0x18, 0x6, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x42, 0x0, 0x0, 0x41100, 0x59, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x5, 0x8000, 0x20}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000480)=[r1], &(0x7f00000004c0)=[{0x1, 0x5, 0x7, 0x4}, {0x3, 0x4, 0x3, 0x6}, {0x1, 0x1, 0xd, 0x7}, {0x3, 0x3, 0x1, 0x7}, {0x0, 0x3, 0xa, 0x2}], 0x10, 0x9}, 0x90) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2a, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x1, 0xb, 0xb, 0x8, 0xc, 0x1}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x5, 0x7, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_val={0x18, 0x6, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x42, 0x0, 0x0, 0x41100, 0x59, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x5, 0x8000, 0x20}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000480)=[r1], &(0x7f00000004c0)=[{0x1, 0x5, 0x7, 0x4}, {0x3, 0x4, 0x3, 0x6}, {0x1, 0x1, 0xd, 0x7}, {0x3, 0x3, 0x1, 0x7}, {0x0, 0x3, 0xa, 0x2}], 0x10, 0x9}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000026c0)={&(0x7f0000000640)="d36ba8a78aa50c424b1e9d5806c14f61104b1437efee43e3a8fe08f60b59bf8e96dcac0fff", &(0x7f0000000680)=""/4096, &(0x7f0000001680)="6ea3ad261b3ad3db1588ede40205042a723e1549faba47e11e1122e88c8f0f48369d", &(0x7f00000016c0)="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", 0x4bda}, 0x38) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={@ifindex=r2, r3, 0x8, 0x5, r1, @prog_fd=r1}, 0x20) bpf$LINK_DETACH(0x22, &(0x7f0000000100)=r0, 0xffffffffffffffdf) 09:30:56 executing program 1: r0 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0xfdd0) (async) socketpair(0x1, 0x6, 0x3ff, &(0x7f00000000c0)) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040)=0xffffffffffffffff, 0xfffffffffffffe94) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2a, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@jmp={0x5, 0x1, 0xb, 0xb, 0x8, 0xc, 0x1}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @jmp={0x5, 0x1, 0x5, 0x7, 0x3, 0xfffffffffffffffe, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @map_val={0x18, 0x6, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x3}, @exit, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000003c0)='syzkaller\x00', 0x42, 0x0, 0x0, 0x41100, 0x59, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000400)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x5, 0x8000, 0x20}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000480)=[r1], &(0x7f00000004c0)=[{0x1, 0x5, 0x7, 0x4}, {0x3, 0x4, 0x3, 0x6}, {0x1, 0x1, 0xd, 0x7}, {0x3, 0x3, 0x1, 0x7}, {0x0, 0x3, 0xa, 0x2}], 0x10, 0x9}, 0x90) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000026c0)={&(0x7f0000000640)="d36ba8a78aa50c424b1e9d5806c14f61104b1437efee43e3a8fe08f60b59bf8e96dcac0fff", &(0x7f0000000680)=""/4096, &(0x7f0000001680)="6ea3ad261b3ad3db1588ede40205042a723e1549faba47e11e1122e88c8f0f48369d", &(0x7f00000016c0)="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", 0x4bda}, 0x38) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={@ifindex=r2, r3, 0x8, 0x5, r1, @prog_fd=r1}, 0x20) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000100)=r0, 0xffffffffffffffdf) 09:30:56 executing program 1: perf_event_open$cgroup(&(0x7f0000001f00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x22081, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/199) 09:30:56 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:57 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:57 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:57 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:57 executing program 1: perf_event_open$cgroup(&(0x7f0000001f00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x22081, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/199) [ 808.544596][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.551119][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 09:30:58 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:30:59 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:30:59 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:00 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:00 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:00 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940), 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:01 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:01 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:01 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940), 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:02 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:02 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:02 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940), 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:03 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:03 executing program 1: perf_event_open$cgroup(&(0x7f0000001f00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x22081, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/199) 09:31:04 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:04 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:04 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffff7fffffffc, 0xffffffffffffffff, 0x0) 09:31:04 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:04 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffff7fffffffc, 0xffffffffffffffff, 0x0) 09:31:04 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffff7fffffffc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xfffffff7fffffffc, 0xffffffffffffffff, 0x0) (async) 09:31:04 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:04 executing program 1: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:04 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) (async) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) syz_open_procfs$namespace(r1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:04 executing program 1: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = getpid() syz_open_procfs$namespace(r1, 0x0) (async) syz_open_procfs$namespace(r1, 0x0) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x1ff) (async) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:05 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) 09:31:05 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:05 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) (async, rerun: 64) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) (async, rerun: 64) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) 09:31:05 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) 09:31:06 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:06 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:06 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) (async) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) 09:31:07 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:07 executing program 1: ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)=0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000000000000000) 09:31:07 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) 09:31:07 executing program 1: ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)=0x1) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000000000000000) 09:31:08 executing program 1: ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)=0x1) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000000000000000) 09:31:08 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:08 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:08 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:08 executing program 1: r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:08 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:08 executing program 1: r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:08 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:08 executing program 1: r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)) (async) sendmsg$unix(r1, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r0, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 09:31:08 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:09 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:09 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:09 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) 09:31:09 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x181000, 0x0) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:09 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 09:31:09 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 09:31:09 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 09:31:09 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xd) 09:31:10 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xd) 09:31:10 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xd) 09:31:10 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x632c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) 09:31:10 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x632c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) 09:31:10 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:10 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x632c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) 09:31:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x525000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x525000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) 09:31:10 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:10 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x525000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x0) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:10 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:10 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:10 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6e66, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000004c0)={&(0x7f0000000040)="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", &(0x7f0000000140)=""/208, &(0x7f0000000240)="0dd9db4217ee449ab03dc77936516303cbb502f0444e809826bc77e3ae38351fabd95871da99aef184355ff3575c0f6d993fd7dade984c057515736495741ca2e47a10157e9b14a7cb84747ea85a810f6a002ea0ca19145d3fd0461e2a566cf8a474be673ee828fcdf4cc75bafc3028f8a88aa9ab3aaa3e1c5b7ea7210319caba5eb877f9f822c0527fc4f06da29ba258c59d63f7e179439186839fde328c7b06a7574fa8cd55512c1ce54626a5679d1aedf3a2a39f5f64dc7e392fa90d9afdda33bc9f4c677d4fc24", &(0x7f0000000340)="9caecaf02f8eeb734fa7c6cca41920eca729dd2fbe6f6e9b9c0d1cc2d8760497016fb1a2a511c8468a5ec9351986c1ef0e23b1b44ac080485ddcd1a6601588832378d219b3aa58adb05ea2e016c85bb1a97222a852056cccee7e63721d91ea80bd9dd6a738851ead306ea677acf66071be4d4da4bf1d97b417e8d0fed58ec265042478c4a7072874ff61dec307268772718fc8af40b3ac3a0edd8e6e20296f5604780ce9e6ba70ad4e01ed40bc0e43c951ab8f4d4c1b3072c366ec3c94dce8b8065599", 0x1, r0}, 0x38) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 09:31:11 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6e66, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000004c0)={&(0x7f0000000040)="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", &(0x7f0000000140)=""/208, &(0x7f0000000240)="0dd9db4217ee449ab03dc77936516303cbb502f0444e809826bc77e3ae38351fabd95871da99aef184355ff3575c0f6d993fd7dade984c057515736495741ca2e47a10157e9b14a7cb84747ea85a810f6a002ea0ca19145d3fd0461e2a566cf8a474be673ee828fcdf4cc75bafc3028f8a88aa9ab3aaa3e1c5b7ea7210319caba5eb877f9f822c0527fc4f06da29ba258c59d63f7e179439186839fde328c7b06a7574fa8cd55512c1ce54626a5679d1aedf3a2a39f5f64dc7e392fa90d9afdda33bc9f4c677d4fc24", &(0x7f0000000340)="9caecaf02f8eeb734fa7c6cca41920eca729dd2fbe6f6e9b9c0d1cc2d8760497016fb1a2a511c8468a5ec9351986c1ef0e23b1b44ac080485ddcd1a6601588832378d219b3aa58adb05ea2e016c85bb1a97222a852056cccee7e63721d91ea80bd9dd6a738851ead306ea677acf66071be4d4da4bf1d97b417e8d0fed58ec265042478c4a7072874ff61dec307268772718fc8af40b3ac3a0edd8e6e20296f5604780ce9e6ba70ad4e01ed40bc0e43c951ab8f4d4c1b3072c366ec3c94dce8b8065599", 0x1, r0}, 0x38) (async) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000004c0)={&(0x7f0000000040)="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", &(0x7f0000000140)=""/208, &(0x7f0000000240)="0dd9db4217ee449ab03dc77936516303cbb502f0444e809826bc77e3ae38351fabd95871da99aef184355ff3575c0f6d993fd7dade984c057515736495741ca2e47a10157e9b14a7cb84747ea85a810f6a002ea0ca19145d3fd0461e2a566cf8a474be673ee828fcdf4cc75bafc3028f8a88aa9ab3aaa3e1c5b7ea7210319caba5eb877f9f822c0527fc4f06da29ba258c59d63f7e179439186839fde328c7b06a7574fa8cd55512c1ce54626a5679d1aedf3a2a39f5f64dc7e392fa90d9afdda33bc9f4c677d4fc24", &(0x7f0000000340)="9caecaf02f8eeb734fa7c6cca41920eca729dd2fbe6f6e9b9c0d1cc2d8760497016fb1a2a511c8468a5ec9351986c1ef0e23b1b44ac080485ddcd1a6601588832378d219b3aa58adb05ea2e016c85bb1a97222a852056cccee7e63721d91ea80bd9dd6a738851ead306ea677acf66071be4d4da4bf1d97b417e8d0fed58ec265042478c4a7072874ff61dec307268772718fc8af40b3ac3a0edd8e6e20296f5604780ce9e6ba70ad4e01ed40bc0e43c951ab8f4d4c1b3072c366ec3c94dce8b8065599", 0x1, r0}, 0x38) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 09:31:11 executing program 1: r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000440)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x6e66, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x3}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000004c0)={&(0x7f0000000040)="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", &(0x7f0000000140)=""/208, &(0x7f0000000240)="0dd9db4217ee449ab03dc77936516303cbb502f0444e809826bc77e3ae38351fabd95871da99aef184355ff3575c0f6d993fd7dade984c057515736495741ca2e47a10157e9b14a7cb84747ea85a810f6a002ea0ca19145d3fd0461e2a566cf8a474be673ee828fcdf4cc75bafc3028f8a88aa9ab3aaa3e1c5b7ea7210319caba5eb877f9f822c0527fc4f06da29ba258c59d63f7e179439186839fde328c7b06a7574fa8cd55512c1ce54626a5679d1aedf3a2a39f5f64dc7e392fa90d9afdda33bc9f4c677d4fc24", &(0x7f0000000340)="9caecaf02f8eeb734fa7c6cca41920eca729dd2fbe6f6e9b9c0d1cc2d8760497016fb1a2a511c8468a5ec9351986c1ef0e23b1b44ac080485ddcd1a6601588832378d219b3aa58adb05ea2e016c85bb1a97222a852056cccee7e63721d91ea80bd9dd6a738851ead306ea677acf66071be4d4da4bf1d97b417e8d0fed58ec265042478c4a7072874ff61dec307268772718fc8af40b3ac3a0edd8e6e20296f5604780ce9e6ba70ad4e01ed40bc0e43c951ab8f4d4c1b3072c366ec3c94dce8b8065599", 0x1, r0}, 0x38) (async) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='\x00') 09:31:11 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_pid(r0, &(0x7f0000000040)=0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:11 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_pid(r0, &(0x7f0000000040)=0xffffffffffffffff, 0x12) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:11 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$cgroup_pid(r0, &(0x7f0000000040)=0xffffffffffffffff, 0x12) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:11 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x4d, 0x81, 0x6, 0x2, 0x0, 0x19, 0x24200, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x800, 0x8000000000000005, 0x0, 0x6, 0x6, 0x2, 0xfffc, 0x0, 0x8, 0x0, 0x2}, r2, 0x9, r0, 0x6) perf_event_open$cgroup(&(0x7f0000001f00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)='S', 0x1}, {&(0x7f0000000100)="eb", 0x1}, {0x0}], 0x3, &(0x7f0000000400)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}], 0x38}, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000500)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000540)=0xfffffffffffffb51, 0x12) recvmsg$unix(r5, &(0x7f00000004c0)={&(0x7f0000000240), 0x6e, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/88, 0x58}, {&(0x7f00000003c0)=""/97, 0x61}], 0x3, &(0x7f0000000480)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) openat$cgroup_freezer_state(r4, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x8, 0x3f, 0x4, 0x6, 0x0, 0x401, 0xc809, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5d56, 0x2, @perf_config_ext={0x74, 0x7e3e}, 0x4, 0x7, 0x0, 0x0, 0x8000000000000001, 0x80000001, 0x6, 0x0, 0x4, 0x0, 0x4}, r1, 0x6, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffff7fff) socket$kcm(0x29, 0x2, 0x0) 09:31:11 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:11 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:12 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:12 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:12 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() (async) r1 = getpid() openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) (async) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x4d, 0x81, 0x6, 0x2, 0x0, 0x19, 0x24200, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x800, 0x8000000000000005, 0x0, 0x6, 0x6, 0x2, 0xfffc, 0x0, 0x8, 0x0, 0x2}, r2, 0x9, r0, 0x6) perf_event_open$cgroup(&(0x7f0000001f00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open$cgroup(&(0x7f0000001f00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)='S', 0x1}, {&(0x7f0000000100)="eb", 0x1}, {0x0}], 0x3, &(0x7f0000000400)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}], 0x38}, 0x0) r6 = openat$cgroup_int(r2, &(0x7f0000000500)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000540)=0xfffffffffffffb51, 0x12) recvmsg$unix(r5, &(0x7f00000004c0)={&(0x7f0000000240), 0x6e, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/88, 0x58}, {&(0x7f00000003c0)=""/97, 0x61}], 0x3, &(0x7f0000000480)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) openat$cgroup_freezer_state(r4, &(0x7f00000001c0), 0x2, 0x0) (async) openat$cgroup_freezer_state(r4, &(0x7f00000001c0), 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x8, 0x3f, 0x4, 0x6, 0x0, 0x401, 0xc809, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5d56, 0x2, @perf_config_ext={0x74, 0x7e3e}, 0x4, 0x7, 0x0, 0x0, 0x8000000000000001, 0x80000001, 0x6, 0x0, 0x4, 0x0, 0x4}, r1, 0x6, r3, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x8, 0x3f, 0x4, 0x6, 0x0, 0x401, 0xc809, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5d56, 0x2, @perf_config_ext={0x74, 0x7e3e}, 0x4, 0x7, 0x0, 0x0, 0x8000000000000001, 0x80000001, 0x6, 0x0, 0x4, 0x0, 0x4}, r1, 0x6, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffff7fff) socket$kcm(0x29, 0x2, 0x0) 09:31:13 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000950000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:13 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = getpid() r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x4d, 0x81, 0x6, 0x2, 0x0, 0x19, 0x24200, 0x5, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffc, 0x4, @perf_bp={&(0x7f0000000080), 0xd}, 0x800, 0x8000000000000005, 0x0, 0x6, 0x6, 0x2, 0xfffc, 0x0, 0x8, 0x0, 0x2}, r2, 0x9, r0, 0x6) perf_event_open$cgroup(&(0x7f0000001f00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) (async, rerun: 32) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)='S', 0x1}, {&(0x7f0000000100)="eb", 0x1}, {0x0}], 0x3, &(0x7f0000000400)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote}}}], 0x38}, 0x0) (async) r6 = openat$cgroup_int(r2, &(0x7f0000000500)='io.bfq.weight\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000000540)=0xfffffffffffffb51, 0x12) (async) recvmsg$unix(r5, &(0x7f00000004c0)={&(0x7f0000000240), 0x6e, &(0x7f0000000440)=[{&(0x7f00000002c0)=""/68, 0x44}, {&(0x7f0000000340)=""/88, 0x58}, {&(0x7f00000003c0)=""/97, 0x61}], 0x3, &(0x7f0000000480)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x0) (async) openat$cgroup_freezer_state(r4, &(0x7f00000001c0), 0x2, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x8, 0x3f, 0x4, 0x6, 0x0, 0x401, 0xc809, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5d56, 0x2, @perf_config_ext={0x74, 0x7e3e}, 0x4, 0x7, 0x0, 0x0, 0x8000000000000001, 0x80000001, 0x6, 0x0, 0x4, 0x0, 0x4}, r1, 0x6, r3, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffff7fff) (async, rerun: 32) socket$kcm(0x29, 0x2, 0x0) 09:31:13 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:13 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x669, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) r1 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) sendmsg$sock(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001440)="23a42597579099d892eb63e1ba03a3ef24d102c1c33c555c7dcb140fcb8287f5b55c64a66184609468471179a928f5ed53c98cb35a8f2a", 0x37}, {&(0x7f0000001480)="b14f1f3c4cbeff1d640eec0bdd80a333011943eb3d5dc562c47b36cb12f68e960209a3f48d8282e2cb6f43676ee093cc83e9a43b0cfb1ed6ca69a1dd2fa437987c11c01a0daf50004500a39da53617826a68936a0fd32af041bd9469d4a897b5b871e2d5857084095f0560ca156d13ebec62a4d4d654d1a879b93d51", 0x7c}, {&(0x7f0000001500)="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", 0xfc}, {&(0x7f0000001600)="602498bfe852470b971b09f2beeaa57238902257a310e2f26c2481819daf06f158f75d44fae102328920a756f20e8aa2d2be5ad8ba43c0cebb74c4b51dd5113fffad8401b1d69fa5ae2ebb00150f209bc9426e52992965ff8d7fbf7dc9bd93190687864cb35e4ec0d6ed16b4c9ebe813d2d4ba2100bf61456598c9e75de81ef254be5ba2877c6050aa4be0da4775363e8139b74b698b3a90aebd3a1f5d9f30a2d75c2c4976323736bbcb4358d320dcfab641367414a74bfb97f5850ae1a3d54655efae6ba6cf84", 0xc7}, {&(0x7f0000001700)="5a6dd4aa7ad2cec139901a6aa49a162527745c1826ef66add89b29564a3874e665844d5daea70fba1f1ddda445ac339972c46cf3a50c9ad75caeec56141d2eb3f68ff8f459f493e40d3dfaf54e66e16184abd0ed8fdc0ab4a1e272b0bf33f2b125241e42e51e74c260f1af09b42d22cbdd3cbfc6b721578a303dad3fb344d71b7a25803343242aeb0f28d6882b704e27e7f852fa481da24e5a51ae2644a7d67a348331d0ad68d669c3a1a53aa6fbb64a8cc28ffaeae98088acf1cfc1183e9b2c23f05241e2faf0ee3f9bdd54b6b08792803a1becf1ded57e36", 0xd9}, {&(0x7f0000001800)="5e72f712f242b59a7bd5a2e8d4ad1b31c7a3796a4eb1498a9f266051814549b84c71e127211171190983c7a82a78e64aa1e0e92ef256b4addc1876c89347221fb5f48a6552608afc66b74f977e399b3b6df0e47529ed88b5288bfbcacb2479b46b38717a3ec03d367d81ab3bfba43daa0e89d23a034075627b0ab37ad681f44141e7dafb2d722ea2d78b6486a1ab6eaa06418a8af3a551221f9e244eb4c7d897da8823b06bbeeb3eca8b746282f9cf", 0xaf}], 0x6, &(0x7f0000001940)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x18}, 0x0) r4 = getpid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000020c0)={r0, &(0x7f0000002040)="b761c84bc741c3f429e83e2a3d723e7ab8e689ba2869da3661d39c44b154cb56935383a30eb1bc22db6587fa39af391eee68581cca84423b0059d932d1b07ab819eae50ee0dc953c21fcb70fe3de75ecf332171fc23da5b78cfef33238436aebaa725f7f0d2bb83c401fde7dc0f28eb2cc236d5856862e2490882cb45a349bcd"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002000)={{r6}, &(0x7f0000001f80), &(0x7f0000001fc0)='%-010d \x00'}, 0x20) sendmsg$unix(r5, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x40}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\b'], 0x18}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e00)='memory.events\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f00000019c0)="a6fe619119b0cb57fbd13338c2065f33adbe82a86c301b5da17fd11a9dbca8da6067348f90d3b35fe141c66380e2a774eff1717cfa64df439396493b88ba2044d0cfbe23aeecf2b78fbc0048b3815c2834870b69f29d91901f189c329e71fb1b738104abfeb209aa0f7ff9900b5e41234ab1f4469a4b2bc90839cceaeb5e512e14fdd35db064b1c585b0ffbb9f3e147be0f46bd27228bc27cefc0d65b0decc323edfcbc4af022ef7852063127cd2705aa7a173c11d22632da7d7ebf03449ccec0af1ec98", 0xc4}, {&(0x7f0000001ac0)="016f8a8a54913d393d22ca02b8", 0xd}, {&(0x7f0000001b00)="f00f400300ca2e59446c916c1e440d229574d8b2914a6562d1116e4fe466ba4dc2b3a5f4f9d58f88", 0x28}, {&(0x7f0000001b40)="ecc98475241003ea9272d377364fa718ae21c40c62f17b1a14185636c9c0255dc736d58ffbf8996045893cf547d8170da6e7d467ee2d8562740988abcdb69dc67a9ced488cc63be59092582a097b957ef602cb8466263ac18daeb18aeb20cadac2b264a8e81e53ae13861b1ef9a80c42431ce999de2c9a62c1dc8afc4c81be2806abf722deac042326bdc9c1dc87c3d2ad31d0a876a3073a4a7b904126e828fc263276eb920b", 0xa6}, {&(0x7f0000001c00)="ad8b10304d7788971836912a5008f7396d96447b9ad28deb15a1065156845c85c808aa1260342d10a28c66bd5f62fa86f00ce0d5b776bd066fa9c7f052dd97f62c8bc5f82468e546d757b5886056b10e2f12f6a05e754e185d6e39f5510329076f0388095fd7f4e82eb15e705282318c6afe38fed7fb15c3b5634f975597cd3d34b77b847d87fe", 0x87}, {&(0x7f0000001cc0)="f93f67b7849e1015b057c9d1e7563382a08c9b2d244270add16e79ae18e40e5f78a0a66c1fddfd1306eeaf79f71010b397dc61f86efa4fb411be98de4c822fe28005899d24c8b142c4f9590f41d1d3f09cf8c06e60c541be31703c722fa50010d66572424e5eae78ea06ac5781f55c1dc25f06600883fefcec6a5a70336618d0077cb124744a251e872ca3cf7c3395ca3f3b39cf028744cbd768c64cc7d48660cdd05990504771265ad9265e088ac1063e2b421062b5252e215bb6ace19078", 0xbf}], 0x6, &(0x7f0000001e40)=[@rights={{0x20, 0x1, 0x1, [r3, r2, r5, r3]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r7, r8, r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}], 0x80, 0x8008090}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001400)={&(0x7f0000000200)="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", &(0x7f0000001200)=""/199, &(0x7f0000001300)="7589fe87acb5ba16c2341f0a", &(0x7f0000001340)="26e571d3b0dc2d1aa00136c1be29caa4fa1150038626b9af214a66bfbdb455e554d1083cb3c194e9dc55619b85a185bb1023ef42b51f11dfd5c9e7abe3dd78175ced5cb0870feb17eb8995ffe5e0d242fd77e4100a213debc82bf3322983daa20218d02b1a6e8b120b409d55430283e1f3bb5751e370f8ca1e49d20697fc7f8a663682ef5787fe537cc101cc9d5f241a142f2bbb553e57afc5", 0x3, r0, 0x4}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x45, '\x00', r9, r10, 0x0, 0x4, 0x2}, 0x48) 09:31:13 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x669, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) r1 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) sendmsg$sock(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001440)="23a42597579099d892eb63e1ba03a3ef24d102c1c33c555c7dcb140fcb8287f5b55c64a66184609468471179a928f5ed53c98cb35a8f2a", 0x37}, {&(0x7f0000001480)="b14f1f3c4cbeff1d640eec0bdd80a333011943eb3d5dc562c47b36cb12f68e960209a3f48d8282e2cb6f43676ee093cc83e9a43b0cfb1ed6ca69a1dd2fa437987c11c01a0daf50004500a39da53617826a68936a0fd32af041bd9469d4a897b5b871e2d5857084095f0560ca156d13ebec62a4d4d654d1a879b93d51", 0x7c}, {&(0x7f0000001500)="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", 0xfc}, {&(0x7f0000001600)="602498bfe852470b971b09f2beeaa57238902257a310e2f26c2481819daf06f158f75d44fae102328920a756f20e8aa2d2be5ad8ba43c0cebb74c4b51dd5113fffad8401b1d69fa5ae2ebb00150f209bc9426e52992965ff8d7fbf7dc9bd93190687864cb35e4ec0d6ed16b4c9ebe813d2d4ba2100bf61456598c9e75de81ef254be5ba2877c6050aa4be0da4775363e8139b74b698b3a90aebd3a1f5d9f30a2d75c2c4976323736bbcb4358d320dcfab641367414a74bfb97f5850ae1a3d54655efae6ba6cf84", 0xc7}, {&(0x7f0000001700)="5a6dd4aa7ad2cec139901a6aa49a162527745c1826ef66add89b29564a3874e665844d5daea70fba1f1ddda445ac339972c46cf3a50c9ad75caeec56141d2eb3f68ff8f459f493e40d3dfaf54e66e16184abd0ed8fdc0ab4a1e272b0bf33f2b125241e42e51e74c260f1af09b42d22cbdd3cbfc6b721578a303dad3fb344d71b7a25803343242aeb0f28d6882b704e27e7f852fa481da24e5a51ae2644a7d67a348331d0ad68d669c3a1a53aa6fbb64a8cc28ffaeae98088acf1cfc1183e9b2c23f05241e2faf0ee3f9bdd54b6b08792803a1becf1ded57e36", 0xd9}, {&(0x7f0000001800)="5e72f712f242b59a7bd5a2e8d4ad1b31c7a3796a4eb1498a9f266051814549b84c71e127211171190983c7a82a78e64aa1e0e92ef256b4addc1876c89347221fb5f48a6552608afc66b74f977e399b3b6df0e47529ed88b5288bfbcacb2479b46b38717a3ec03d367d81ab3bfba43daa0e89d23a034075627b0ab37ad681f44141e7dafb2d722ea2d78b6486a1ab6eaa06418a8af3a551221f9e244eb4c7d897da8823b06bbeeb3eca8b746282f9cf", 0xaf}], 0x6, &(0x7f0000001940)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x18}, 0x0) r4 = getpid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000020c0)={r0, &(0x7f0000002040)="b761c84bc741c3f429e83e2a3d723e7ab8e689ba2869da3661d39c44b154cb56935383a30eb1bc22db6587fa39af391eee68581cca84423b0059d932d1b07ab819eae50ee0dc953c21fcb70fe3de75ecf332171fc23da5b78cfef33238436aebaa725f7f0d2bb83c401fde7dc0f28eb2cc236d5856862e2490882cb45a349bcd"}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002000)={{r6}, &(0x7f0000001f80), &(0x7f0000001fc0)='%-010d \x00'}, 0x20) sendmsg$unix(r5, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x40}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\b'], 0x18}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e00)='memory.events\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f00000019c0)="a6fe619119b0cb57fbd13338c2065f33adbe82a86c301b5da17fd11a9dbca8da6067348f90d3b35fe141c66380e2a774eff1717cfa64df439396493b88ba2044d0cfbe23aeecf2b78fbc0048b3815c2834870b69f29d91901f189c329e71fb1b738104abfeb209aa0f7ff9900b5e41234ab1f4469a4b2bc90839cceaeb5e512e14fdd35db064b1c585b0ffbb9f3e147be0f46bd27228bc27cefc0d65b0decc323edfcbc4af022ef7852063127cd2705aa7a173c11d22632da7d7ebf03449ccec0af1ec98", 0xc4}, {&(0x7f0000001ac0)="016f8a8a54913d393d22ca02b8", 0xd}, {&(0x7f0000001b00)="f00f400300ca2e59446c916c1e440d229574d8b2914a6562d1116e4fe466ba4dc2b3a5f4f9d58f88", 0x28}, {&(0x7f0000001b40)="ecc98475241003ea9272d377364fa718ae21c40c62f17b1a14185636c9c0255dc736d58ffbf8996045893cf547d8170da6e7d467ee2d8562740988abcdb69dc67a9ced488cc63be59092582a097b957ef602cb8466263ac18daeb18aeb20cadac2b264a8e81e53ae13861b1ef9a80c42431ce999de2c9a62c1dc8afc4c81be2806abf722deac042326bdc9c1dc87c3d2ad31d0a876a3073a4a7b904126e828fc263276eb920b", 0xa6}, {&(0x7f0000001c00)="ad8b10304d7788971836912a5008f7396d96447b9ad28deb15a1065156845c85c808aa1260342d10a28c66bd5f62fa86f00ce0d5b776bd066fa9c7f052dd97f62c8bc5f82468e546d757b5886056b10e2f12f6a05e754e185d6e39f5510329076f0388095fd7f4e82eb15e705282318c6afe38fed7fb15c3b5634f975597cd3d34b77b847d87fe", 0x87}, {&(0x7f0000001cc0)="f93f67b7849e1015b057c9d1e7563382a08c9b2d244270add16e79ae18e40e5f78a0a66c1fddfd1306eeaf79f71010b397dc61f86efa4fb411be98de4c822fe28005899d24c8b142c4f9590f41d1d3f09cf8c06e60c541be31703c722fa50010d66572424e5eae78ea06ac5781f55c1dc25f06600883fefcec6a5a70336618d0077cb124744a251e872ca3cf7c3395ca3f3b39cf028744cbd768c64cc7d48660cdd05990504771265ad9265e088ac1063e2b421062b5252e215bb6ace19078", 0xbf}], 0x6, &(0x7f0000001e40)=[@rights={{0x20, 0x1, 0x1, [r3, r2, r5, r3]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r7, r8, r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}], 0x80, 0x8008090}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001400)={&(0x7f0000000200)="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", &(0x7f0000001200)=""/199, &(0x7f0000001300)="7589fe87acb5ba16c2341f0a", &(0x7f0000001340)="26e571d3b0dc2d1aa00136c1be29caa4fa1150038626b9af214a66bfbdb455e554d1083cb3c194e9dc55619b85a185bb1023ef42b51f11dfd5c9e7abe3dd78175ced5cb0870feb17eb8995ffe5e0d242fd77e4100a213debc82bf3322983daa20218d02b1a6e8b120b409d55430283e1f3bb5751e370f8ca1e49d20697fc7f8a663682ef5787fe537cc101cc9d5f241a142f2bbb553e57afc5", 0x3, r0, 0x4}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x45, '\x00', r9, r10, 0x0, 0x4, 0x2}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x669, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) getpid() (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)) (async) sendmsg$unix(r3, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) (async) sendmsg$sock(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001440)="23a42597579099d892eb63e1ba03a3ef24d102c1c33c555c7dcb140fcb8287f5b55c64a66184609468471179a928f5ed53c98cb35a8f2a", 0x37}, {&(0x7f0000001480)="b14f1f3c4cbeff1d640eec0bdd80a333011943eb3d5dc562c47b36cb12f68e960209a3f48d8282e2cb6f43676ee093cc83e9a43b0cfb1ed6ca69a1dd2fa437987c11c01a0daf50004500a39da53617826a68936a0fd32af041bd9469d4a897b5b871e2d5857084095f0560ca156d13ebec62a4d4d654d1a879b93d51", 0x7c}, {&(0x7f0000001500)="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", 0xfc}, {&(0x7f0000001600)="602498bfe852470b971b09f2beeaa57238902257a310e2f26c2481819daf06f158f75d44fae102328920a756f20e8aa2d2be5ad8ba43c0cebb74c4b51dd5113fffad8401b1d69fa5ae2ebb00150f209bc9426e52992965ff8d7fbf7dc9bd93190687864cb35e4ec0d6ed16b4c9ebe813d2d4ba2100bf61456598c9e75de81ef254be5ba2877c6050aa4be0da4775363e8139b74b698b3a90aebd3a1f5d9f30a2d75c2c4976323736bbcb4358d320dcfab641367414a74bfb97f5850ae1a3d54655efae6ba6cf84", 0xc7}, {&(0x7f0000001700)="5a6dd4aa7ad2cec139901a6aa49a162527745c1826ef66add89b29564a3874e665844d5daea70fba1f1ddda445ac339972c46cf3a50c9ad75caeec56141d2eb3f68ff8f459f493e40d3dfaf54e66e16184abd0ed8fdc0ab4a1e272b0bf33f2b125241e42e51e74c260f1af09b42d22cbdd3cbfc6b721578a303dad3fb344d71b7a25803343242aeb0f28d6882b704e27e7f852fa481da24e5a51ae2644a7d67a348331d0ad68d669c3a1a53aa6fbb64a8cc28ffaeae98088acf1cfc1183e9b2c23f05241e2faf0ee3f9bdd54b6b08792803a1becf1ded57e36", 0xd9}, {&(0x7f0000001800)="5e72f712f242b59a7bd5a2e8d4ad1b31c7a3796a4eb1498a9f266051814549b84c71e127211171190983c7a82a78e64aa1e0e92ef256b4addc1876c89347221fb5f48a6552608afc66b74f977e399b3b6df0e47529ed88b5288bfbcacb2479b46b38717a3ec03d367d81ab3bfba43daa0e89d23a034075627b0ab37ad681f44141e7dafb2d722ea2d78b6486a1ab6eaa06418a8af3a551221f9e244eb4c7d897da8823b06bbeeb3eca8b746282f9cf", 0xaf}], 0x6, &(0x7f0000001940)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x18}, 0x0) (async) getpid() (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000020c0)={r0, &(0x7f0000002040)="b761c84bc741c3f429e83e2a3d723e7ab8e689ba2869da3661d39c44b154cb56935383a30eb1bc22db6587fa39af391eee68581cca84423b0059d932d1b07ab819eae50ee0dc953c21fcb70fe3de75ecf332171fc23da5b78cfef33238436aebaa725f7f0d2bb83c401fde7dc0f28eb2cc236d5856862e2490882cb45a349bcd"}, 0x20) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) (async) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002000)={{r6}, &(0x7f0000001f80), &(0x7f0000001fc0)='%-010d \x00'}, 0x20) (async) sendmsg$unix(r5, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x40}, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)) (async) sendmsg$unix(r7, &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\b'], 0x18}, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e00)='memory.events\x00', 0x0, 0x0) (async) sendmsg$unix(r2, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f00000019c0)="a6fe619119b0cb57fbd13338c2065f33adbe82a86c301b5da17fd11a9dbca8da6067348f90d3b35fe141c66380e2a774eff1717cfa64df439396493b88ba2044d0cfbe23aeecf2b78fbc0048b3815c2834870b69f29d91901f189c329e71fb1b738104abfeb209aa0f7ff9900b5e41234ab1f4469a4b2bc90839cceaeb5e512e14fdd35db064b1c585b0ffbb9f3e147be0f46bd27228bc27cefc0d65b0decc323edfcbc4af022ef7852063127cd2705aa7a173c11d22632da7d7ebf03449ccec0af1ec98", 0xc4}, {&(0x7f0000001ac0)="016f8a8a54913d393d22ca02b8", 0xd}, {&(0x7f0000001b00)="f00f400300ca2e59446c916c1e440d229574d8b2914a6562d1116e4fe466ba4dc2b3a5f4f9d58f88", 0x28}, {&(0x7f0000001b40)="ecc98475241003ea9272d377364fa718ae21c40c62f17b1a14185636c9c0255dc736d58ffbf8996045893cf547d8170da6e7d467ee2d8562740988abcdb69dc67a9ced488cc63be59092582a097b957ef602cb8466263ac18daeb18aeb20cadac2b264a8e81e53ae13861b1ef9a80c42431ce999de2c9a62c1dc8afc4c81be2806abf722deac042326bdc9c1dc87c3d2ad31d0a876a3073a4a7b904126e828fc263276eb920b", 0xa6}, {&(0x7f0000001c00)="ad8b10304d7788971836912a5008f7396d96447b9ad28deb15a1065156845c85c808aa1260342d10a28c66bd5f62fa86f00ce0d5b776bd066fa9c7f052dd97f62c8bc5f82468e546d757b5886056b10e2f12f6a05e754e185d6e39f5510329076f0388095fd7f4e82eb15e705282318c6afe38fed7fb15c3b5634f975597cd3d34b77b847d87fe", 0x87}, {&(0x7f0000001cc0)="f93f67b7849e1015b057c9d1e7563382a08c9b2d244270add16e79ae18e40e5f78a0a66c1fddfd1306eeaf79f71010b397dc61f86efa4fb411be98de4c822fe28005899d24c8b142c4f9590f41d1d3f09cf8c06e60c541be31703c722fa50010d66572424e5eae78ea06ac5781f55c1dc25f06600883fefcec6a5a70336618d0077cb124744a251e872ca3cf7c3395ca3f3b39cf028744cbd768c64cc7d48660cdd05990504771265ad9265e088ac1063e2b421062b5252e215bb6ace19078", 0xbf}], 0x6, &(0x7f0000001e40)=[@rights={{0x20, 0x1, 0x1, [r3, r2, r5, r3]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r7, r8, r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}], 0x80, 0x8008090}, 0x80) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001400)={&(0x7f0000000200)="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", &(0x7f0000001200)=""/199, &(0x7f0000001300)="7589fe87acb5ba16c2341f0a", &(0x7f0000001340)="26e571d3b0dc2d1aa00136c1be29caa4fa1150038626b9af214a66bfbdb455e554d1083cb3c194e9dc55619b85a185bb1023ef42b51f11dfd5c9e7abe3dd78175ced5cb0870feb17eb8995ffe5e0d242fd77e4100a213debc82bf3322983daa20218d02b1a6e8b120b409d55430283e1f3bb5751e370f8ca1e49d20697fc7f8a663682ef5787fe537cc101cc9d5f241a142f2bbb553e57afc5", 0x3, r0, 0x4}, 0x38) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)}, 0x10) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x45, '\x00', r9, r10, 0x0, 0x4, 0x2}, 0x48) (async) 09:31:13 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:13 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:14 executing program 1: r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x669, 0x0, 0xffffffffffffffff, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x2}, 0x48) (async) r1 = getpid() (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) (async) sendmsg$sock(r3, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001440)="23a42597579099d892eb63e1ba03a3ef24d102c1c33c555c7dcb140fcb8287f5b55c64a66184609468471179a928f5ed53c98cb35a8f2a", 0x37}, {&(0x7f0000001480)="b14f1f3c4cbeff1d640eec0bdd80a333011943eb3d5dc562c47b36cb12f68e960209a3f48d8282e2cb6f43676ee093cc83e9a43b0cfb1ed6ca69a1dd2fa437987c11c01a0daf50004500a39da53617826a68936a0fd32af041bd9469d4a897b5b871e2d5857084095f0560ca156d13ebec62a4d4d654d1a879b93d51", 0x7c}, {&(0x7f0000001500)="068518e35c8d1a41d7ecb4c4b406f0d4bd623c1a598748acf5749fabda31ff006cb5d836adc158dc55c78b276ae3f9dbfe9a813f3bcd395036e8355941a57ba897fcfcdd7145d23766633507953cdba4ff107781d2bb946c43af826df0b77e49659b400fd4a3a426e68f2c8b673766ad81523ac97aa3d25c751918fb46d9319da4fad20e92054b4fef4f2d3915a04e916031d060ff1216a6ab0142870468cbdd54ba11045bd7c6f3c447a54e79c989db9fa024478ebdb875b40b4f4ae66987b0bfe6f274b6464c997419cced83d1eafc887bec0a8b385682579841802d03dcb906d9f167e7e7d0d4f68da0e1af7e03d4520af7c8929b4ce7864c9185", 0xfc}, {&(0x7f0000001600)="602498bfe852470b971b09f2beeaa57238902257a310e2f26c2481819daf06f158f75d44fae102328920a756f20e8aa2d2be5ad8ba43c0cebb74c4b51dd5113fffad8401b1d69fa5ae2ebb00150f209bc9426e52992965ff8d7fbf7dc9bd93190687864cb35e4ec0d6ed16b4c9ebe813d2d4ba2100bf61456598c9e75de81ef254be5ba2877c6050aa4be0da4775363e8139b74b698b3a90aebd3a1f5d9f30a2d75c2c4976323736bbcb4358d320dcfab641367414a74bfb97f5850ae1a3d54655efae6ba6cf84", 0xc7}, {&(0x7f0000001700)="5a6dd4aa7ad2cec139901a6aa49a162527745c1826ef66add89b29564a3874e665844d5daea70fba1f1ddda445ac339972c46cf3a50c9ad75caeec56141d2eb3f68ff8f459f493e40d3dfaf54e66e16184abd0ed8fdc0ab4a1e272b0bf33f2b125241e42e51e74c260f1af09b42d22cbdd3cbfc6b721578a303dad3fb344d71b7a25803343242aeb0f28d6882b704e27e7f852fa481da24e5a51ae2644a7d67a348331d0ad68d669c3a1a53aa6fbb64a8cc28ffaeae98088acf1cfc1183e9b2c23f05241e2faf0ee3f9bdd54b6b08792803a1becf1ded57e36", 0xd9}, {&(0x7f0000001800)="5e72f712f242b59a7bd5a2e8d4ad1b31c7a3796a4eb1498a9f266051814549b84c71e127211171190983c7a82a78e64aa1e0e92ef256b4addc1876c89347221fb5f48a6552608afc66b74f977e399b3b6df0e47529ed88b5288bfbcacb2479b46b38717a3ec03d367d81ab3bfba43daa0e89d23a034075627b0ab37ad681f44141e7dafb2d722ea2d78b6486a1ab6eaa06418a8af3a551221f9e244eb4c7d897da8823b06bbeeb3eca8b746282f9cf", 0xaf}], 0x6, &(0x7f0000001940)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x18}, 0x0) r4 = getpid() (async, rerun: 32) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000020c0)={r0, &(0x7f0000002040)="b761c84bc741c3f429e83e2a3d723e7ab8e689ba2869da3661d39c44b154cb56935383a30eb1bc22db6587fa39af391eee68581cca84423b0059d932d1b07ab819eae50ee0dc953c21fcb70fe3de75ecf332171fc23da5b78cfef33238436aebaa725f7f0d2bb83c401fde7dc0f28eb2cc236d5856862e2490882cb45a349bcd"}, 0x20) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001f00)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000002000)={{r6}, &(0x7f0000001f80), &(0x7f0000001fc0)='%-010d \x00'}, 0x20) (async) sendmsg$unix(r5, &(0x7f0000002f00)={&(0x7f0000002a80)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000002e40)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee00}}}], 0x40}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000002f00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\b'], 0x18}, 0x0) (async) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001e00)='memory.events\x00', 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f00000019c0)="a6fe619119b0cb57fbd13338c2065f33adbe82a86c301b5da17fd11a9dbca8da6067348f90d3b35fe141c66380e2a774eff1717cfa64df439396493b88ba2044d0cfbe23aeecf2b78fbc0048b3815c2834870b69f29d91901f189c329e71fb1b738104abfeb209aa0f7ff9900b5e41234ab1f4469a4b2bc90839cceaeb5e512e14fdd35db064b1c585b0ffbb9f3e147be0f46bd27228bc27cefc0d65b0decc323edfcbc4af022ef7852063127cd2705aa7a173c11d22632da7d7ebf03449ccec0af1ec98", 0xc4}, {&(0x7f0000001ac0)="016f8a8a54913d393d22ca02b8", 0xd}, {&(0x7f0000001b00)="f00f400300ca2e59446c916c1e440d229574d8b2914a6562d1116e4fe466ba4dc2b3a5f4f9d58f88", 0x28}, {&(0x7f0000001b40)="ecc98475241003ea9272d377364fa718ae21c40c62f17b1a14185636c9c0255dc736d58ffbf8996045893cf547d8170da6e7d467ee2d8562740988abcdb69dc67a9ced488cc63be59092582a097b957ef602cb8466263ac18daeb18aeb20cadac2b264a8e81e53ae13861b1ef9a80c42431ce999de2c9a62c1dc8afc4c81be2806abf722deac042326bdc9c1dc87c3d2ad31d0a876a3073a4a7b904126e828fc263276eb920b", 0xa6}, {&(0x7f0000001c00)="ad8b10304d7788971836912a5008f7396d96447b9ad28deb15a1065156845c85c808aa1260342d10a28c66bd5f62fa86f00ce0d5b776bd066fa9c7f052dd97f62c8bc5f82468e546d757b5886056b10e2f12f6a05e754e185d6e39f5510329076f0388095fd7f4e82eb15e705282318c6afe38fed7fb15c3b5634f975597cd3d34b77b847d87fe", 0x87}, {&(0x7f0000001cc0)="f93f67b7849e1015b057c9d1e7563382a08c9b2d244270add16e79ae18e40e5f78a0a66c1fddfd1306eeaf79f71010b397dc61f86efa4fb411be98de4c822fe28005899d24c8b142c4f9590f41d1d3f09cf8c06e60c541be31703c722fa50010d66572424e5eae78ea06ac5781f55c1dc25f06600883fefcec6a5a70336618d0077cb124744a251e872ca3cf7c3395ca3f3b39cf028744cbd768c64cc7d48660cdd05990504771265ad9265e088ac1063e2b421062b5252e215bb6ace19078", 0xbf}], 0x6, &(0x7f0000001e40)=[@rights={{0x20, 0x1, 0x1, [r3, r2, r5, r3]}}, @rights={{0x24, 0x1, 0x1, [r3, r2, r7, r8, r2]}}, @rights={{0x18, 0x1, 0x1, [r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0xee00, 0xee01}}}], 0x80, 0x8008090}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001400)={&(0x7f0000000200)="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", &(0x7f0000001200)=""/199, &(0x7f0000001300)="7589fe87acb5ba16c2341f0a", &(0x7f0000001340)="26e571d3b0dc2d1aa00136c1be29caa4fa1150038626b9af214a66bfbdb455e554d1083cb3c194e9dc55619b85a185bb1023ef42b51f11dfd5c9e7abe3dd78175ced5cb0870feb17eb8995ffe5e0d242fd77e4100a213debc82bf3322983daa20218d02b1a6e8b120b409d55430283e1f3bb5751e370f8ca1e49d20697fc7f8a663682ef5787fe537cc101cc9d5f241a142f2bbb553e57afc5", 0x3, r0, 0x4}, 0x38) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x45, '\x00', r9, r10, 0x0, 0x4, 0x2}, 0x48) 09:31:14 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) 09:31:14 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) 09:31:14 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) 09:31:14 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:14 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:14 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:14 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 09:31:14 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:14 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) 09:31:14 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) 09:31:15 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) 09:31:15 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000950000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:15 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x2, 0x6, 0x4, 0xae, 0x0, 0x800, 0x10800, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x20, 0x2}, 0x1010, 0x9, 0x100, 0x4, 0x200, 0x20, 0x9, 0x0, 0x7b5aa648, 0x0, 0x3}, 0x0, 0xb, r0, 0x1) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xa000) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x1, 0xcd, 0x0, 0x9, 0x8008, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb5, 0x2, @perf_config_ext={0x1, 0x85}, 0x21, 0x8000000000000001, 0x5, 0x7, 0xffffffffffffffff, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x8}, r2, 0xb, 0xffffffffffffffff, 0x1) syz_clone(0x4000000, &(0x7f0000000140)="b3a35bd10d69cd8387f4495f52f8819ed91f270d168cc36272abbffa5514f52124c41b2f93a95f5489e596bab27f693afcbda32dc658e6d8d70faaf46323de3e1eb7e16f9af30cf4f4d6113329f2df5e25f84accad67146079c18f737659221d1d1f493b7b6cd2a3219c4fd77b9400ce07e947bf277982b44d147fd5088a716b5b61a340ea8bbdea5d1581f08ca3a58263742ac8a4f56292c86dbb2e405b8ee3e8594102cc00ff2a025e1a96ce0d4dfbe863c039ad78d258af12b5518c807a59cb78a63429b9e68bd397f6c2261b3466a74899a5ff661716ecc98206f99154e32f2bc81b16b6eede724db4f39b157644b0bbb0", 0xf3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="8d802ec3b524f3ab73fefab5d257aa2797f654047f6e792fa8b9272fa358f55f1c03cd4ca49650f01c9f240ae81f4ef49b09ac18c1d97b0308869b1c8964764a20aa2d9f7b321550af04921ee87d3a430c16ecde345ef3da2aa573f85abe1f15a467017cca8d40fafc3138e7") ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) 09:31:15 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x2, 0x6, 0x4, 0xae, 0x0, 0x800, 0x10800, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x20, 0x2}, 0x1010, 0x9, 0x100, 0x4, 0x200, 0x20, 0x9, 0x0, 0x7b5aa648, 0x0, 0x3}, 0x0, 0xb, r0, 0x1) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xa000) (async) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x1, 0xcd, 0x0, 0x9, 0x8008, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb5, 0x2, @perf_config_ext={0x1, 0x85}, 0x21, 0x8000000000000001, 0x5, 0x7, 0xffffffffffffffff, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x8}, r2, 0xb, 0xffffffffffffffff, 0x1) (async) syz_clone(0x4000000, &(0x7f0000000140)="b3a35bd10d69cd8387f4495f52f8819ed91f270d168cc36272abbffa5514f52124c41b2f93a95f5489e596bab27f693afcbda32dc658e6d8d70faaf46323de3e1eb7e16f9af30cf4f4d6113329f2df5e25f84accad67146079c18f737659221d1d1f493b7b6cd2a3219c4fd77b9400ce07e947bf277982b44d147fd5088a716b5b61a340ea8bbdea5d1581f08ca3a58263742ac8a4f56292c86dbb2e405b8ee3e8594102cc00ff2a025e1a96ce0d4dfbe863c039ad78d258af12b5518c807a59cb78a63429b9e68bd397f6c2261b3466a74899a5ff661716ecc98206f99154e32f2bc81b16b6eede724db4f39b157644b0bbb0", 0xf3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="8d802ec3b524f3ab73fefab5d257aa2797f654047f6e792fa8b9272fa358f55f1c03cd4ca49650f01c9f240ae81f4ef49b09ac18c1d97b0308869b1c8964764a20aa2d9f7b321550af04921ee87d3a430c16ecde345ef3da2aa573f85abe1f15a467017cca8d40fafc3138e7") (async) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) 09:31:15 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 09:31:15 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x2, 0x6, 0x4, 0xae, 0x0, 0x800, 0x10800, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x20, 0x2}, 0x1010, 0x9, 0x100, 0x4, 0x200, 0x20, 0x9, 0x0, 0x7b5aa648, 0x0, 0x3}, 0x0, 0xb, r0, 0x1) (async) r1 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x2, 0x6, 0x4, 0xae, 0x0, 0x800, 0x10800, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x20, 0x2}, 0x1010, 0x9, 0x100, 0x4, 0x200, 0x20, 0x9, 0x0, 0x7b5aa648, 0x0, 0x3}, 0x0, 0xb, r0, 0x1) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xa000) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x7, 0x8, 0x1, 0xcd, 0x0, 0x9, 0x8008, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb5, 0x2, @perf_config_ext={0x1, 0x85}, 0x21, 0x8000000000000001, 0x5, 0x7, 0xffffffffffffffff, 0x5, 0x8000, 0x0, 0x8, 0x0, 0x8}, r2, 0xb, 0xffffffffffffffff, 0x1) syz_clone(0x4000000, &(0x7f0000000140)="b3a35bd10d69cd8387f4495f52f8819ed91f270d168cc36272abbffa5514f52124c41b2f93a95f5489e596bab27f693afcbda32dc658e6d8d70faaf46323de3e1eb7e16f9af30cf4f4d6113329f2df5e25f84accad67146079c18f737659221d1d1f493b7b6cd2a3219c4fd77b9400ce07e947bf277982b44d147fd5088a716b5b61a340ea8bbdea5d1581f08ca3a58263742ac8a4f56292c86dbb2e405b8ee3e8594102cc00ff2a025e1a96ce0d4dfbe863c039ad78d258af12b5518c807a59cb78a63429b9e68bd397f6c2261b3466a74899a5ff661716ecc98206f99154e32f2bc81b16b6eede724db4f39b157644b0bbb0", 0xf3, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="8d802ec3b524f3ab73fefab5d257aa2797f654047f6e792fa8b9272fa358f55f1c03cd4ca49650f01c9f240ae81f4ef49b09ac18c1d97b0308869b1c8964764a20aa2d9f7b321550af04921ee87d3a430c16ecde345ef3da2aa573f85abe1f15a467017cca8d40fafc3138e7") ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) 09:31:15 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbdc6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:16 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbdc6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:16 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) r1 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) 09:31:16 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000950000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:16 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:16 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) (async) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x20) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbdc6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:17 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:17 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 09:31:17 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 09:31:17 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 09:31:18 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@ifindex, 0x8, 0x1, 0x0, &(0x7f0000000080)=[0x0], 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@cgroup, r0, 0x1c, 0x2008, 0x0, @prog_fd=r1, r2}, 0x20) 09:31:18 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x0, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:18 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:18 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) (async) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@ifindex, 0x8, 0x1, 0x0, &(0x7f0000000080)=[0x0], 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@cgroup, r0, 0x1c, 0x2008, 0x0, @prog_fd=r1, r2}, 0x20) 09:31:18 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:18 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:18 executing program 1: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={@ifindex, 0x8, 0x1, 0x0, &(0x7f0000000080)=[0x0], 0x1, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000200)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@cgroup, r0, 0x1c, 0x2008, 0x0, @prog_fd=r1, r2}, 0x20) 09:31:18 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xbb8, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 09:31:19 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xbb8, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xbb8, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) (async) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) (async) 09:31:19 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:19 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xbb8, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 09:31:19 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:19 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:19 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1f) 09:31:20 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1f) 09:31:20 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:20 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1f) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x1f) (async) 09:31:20 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:20 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000000c0)=r0) perf_event_open(&(0x7f0000002000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x10080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1ad200, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x1000) 09:31:21 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:21 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:21 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000095000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:21 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:22 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:22 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:22 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:22 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:23 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:23 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:23 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:23 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:24 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:24 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed92181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:24 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:24 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:25 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:25 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:25 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed92181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:25 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:25 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:26 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:26 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:26 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:27 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed92181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:27 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0), &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:27 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:27 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:28 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:28 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:28 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) (async) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000000c0)=r0) (async) perf_event_open(&(0x7f0000002000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x10080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1ad200, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) (async) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x1000) 09:31:29 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:29 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0), &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000000c0)=r0) perf_event_open(&(0x7f0000002000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x4}, 0x10080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1ad200, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) (async) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) (async) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x1000) (async) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x1000) 09:31:30 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:30 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:30 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0), &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:31 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001140)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000000)=@raw=[@exit, @tail_call, @map_fd={0x18, 0x2, 0x1, 0x0, 0x1}], &(0x7f0000000040)='GPL\x00', 0x7, 0x1000, &(0x7f0000000080)=""/4096, 0x41100, 0x52, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000010c0)={0x1, 0xf, 0xffffffff, 0x9}, 0x10, 0xf023, 0xffffffffffffffff, 0x0, &(0x7f0000001100)=[0x1], 0x0, 0x10, 0x8}, 0x90) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001540)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000001200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001300)='GPL\x00', 0x6, 0xf0, &(0x7f0000001340)=""/240, 0x41100, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001480)={0x5, 0xe, 0x40, 0x5}, 0x10, 0x2ca21, 0xffffffffffffffff, 0x1, &(0x7f00000014c0)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000001500)=[{0x4, 0x4, 0x10, 0xc}], 0x10, 0x7a}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001700)={@cgroup, 0xa, 0x1, 0x6, &(0x7f0000001600)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001640)=[0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000016c0)=[0x0], 0x0}, 0x40) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%ps \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001fc0)={@ifindex, 0x24, 0x0, 0x2, &(0x7f0000001ec0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001f00)=[0x0, 0x0], &(0x7f0000001f40)=[0x0, 0x0], &(0x7f0000001f80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003080)={@map=r3, r1, 0x2a, 0x0, 0x0, @prog_id, r4}, 0x20) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000017c0)=@generic={&(0x7f0000001780)='./file0\x00', 0x0, 0x30}, 0x18) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a40)={&(0x7f0000001900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x100, 0x6, [@struct={0xb, 0x7, 0x0, 0x4, 0x0, 0x2, [{0x1, 0x5, 0x9}, {0xb, 0x5, 0xca}, {0x8, 0x0, 0x7c}, {0x5, 0x2}, {0x0, 0x1, 0x18}, {0x6, 0x2, 0xffffc6b8}, {0x1, 0x0, 0x800}]}, @enum={0x5, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x7}, {0x7, 0x1}, {0x10, 0x72}, {0x9, 0x4}, {0xe, 0x7}, {0x9, 0x1}, {0x9, 0x5}, {0x2, 0xf92}]}, @union={0x1, 0x3, 0x0, 0x5, 0x1, 0x6, [{0xa, 0x1, 0x101}, {0x6, 0x2, 0x20}, {0xa, 0x0, 0x101}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xf, 0x4}, {0xd, 0x1}]}]}, {0x0, [0x30, 0x30, 0x0, 0x0]}}, &(0x7f0000002080)=""/4096, 0x11e, 0x1000, 0x0, 0xa80}, 0x20) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b00)={0x0, 0x80000001}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001bc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001b40), &(0x7f0000001b80)=r1}, 0x20) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0xffffffffffffffff, 0x80, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x16, &(0x7f0000001800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x40}, {}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000018c0)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x16, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000001a80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001ac0)={0x2, 0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001c40)=[r7, r8, r9], &(0x7f0000001c80)=[{0x1, 0x2, 0x0, 0x4}, {0x4, 0x1, 0x4, 0x4}, {0x1, 0x1, 0x10, 0xe}, {0x2, 0x5, 0x2, 0x5}, {0x1, 0x1, 0x4, 0x1}, {0x1, 0x4, 0xa, 0x4}, {0x2, 0x4, 0x2, 0xb}, {0x3, 0x5, 0x4, 0x8}, {0x3, 0x3, 0x7, 0x1}, {0x5, 0x1, 0x0, 0x6}], 0x10, 0x7}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001740)={@ifindex, r0, 0xd, 0x2000, r1, @link_fd, r2}, 0x20) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:31 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001140)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000000)=@raw=[@exit, @tail_call, @map_fd={0x18, 0x2, 0x1, 0x0, 0x1}], &(0x7f0000000040)='GPL\x00', 0x7, 0x1000, &(0x7f0000000080)=""/4096, 0x41100, 0x52, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000010c0)={0x1, 0xf, 0xffffffff, 0x9}, 0x10, 0xf023, 0xffffffffffffffff, 0x0, &(0x7f0000001100)=[0x1], 0x0, 0x10, 0x8}, 0x90) (async) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001540)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000001200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001300)='GPL\x00', 0x6, 0xf0, &(0x7f0000001340)=""/240, 0x41100, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001480)={0x5, 0xe, 0x40, 0x5}, 0x10, 0x2ca21, 0xffffffffffffffff, 0x1, &(0x7f00000014c0)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000001500)=[{0x4, 0x4, 0x10, 0xc}], 0x10, 0x7a}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001700)={@cgroup, 0xa, 0x1, 0x6, &(0x7f0000001600)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001640)=[0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000016c0)=[0x0], 0x0}, 0x40) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%ps \x00'}, 0x20) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001fc0)={@ifindex, 0x24, 0x0, 0x2, &(0x7f0000001ec0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001f00)=[0x0, 0x0], &(0x7f0000001f40)=[0x0, 0x0], &(0x7f0000001f80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003080)={@map=r3, r1, 0x2a, 0x0, 0x0, @prog_id, r4}, 0x20) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000017c0)=@generic={&(0x7f0000001780)='./file0\x00', 0x0, 0x30}, 0x18) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a40)={&(0x7f0000001900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x100, 0x6, [@struct={0xb, 0x7, 0x0, 0x4, 0x0, 0x2, [{0x1, 0x5, 0x9}, {0xb, 0x5, 0xca}, {0x8, 0x0, 0x7c}, {0x5, 0x2}, {0x0, 0x1, 0x18}, {0x6, 0x2, 0xffffc6b8}, {0x1, 0x0, 0x800}]}, @enum={0x5, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x7}, {0x7, 0x1}, {0x10, 0x72}, {0x9, 0x4}, {0xe, 0x7}, {0x9, 0x1}, {0x9, 0x5}, {0x2, 0xf92}]}, @union={0x1, 0x3, 0x0, 0x5, 0x1, 0x6, [{0xa, 0x1, 0x101}, {0x6, 0x2, 0x20}, {0xa, 0x0, 0x101}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xf, 0x4}, {0xd, 0x1}]}]}, {0x0, [0x30, 0x30, 0x0, 0x0]}}, &(0x7f0000002080)=""/4096, 0x11e, 0x1000, 0x0, 0xa80}, 0x20) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b00)={0x0, 0x80000001}, 0xc) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001bc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001b40), &(0x7f0000001b80)=r1}, 0x20) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0xffffffffffffffff, 0x80, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x16, &(0x7f0000001800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x40}, {}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000018c0)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x16, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000001a80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001ac0)={0x2, 0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001c40)=[r7, r8, r9], &(0x7f0000001c80)=[{0x1, 0x2, 0x0, 0x4}, {0x4, 0x1, 0x4, 0x4}, {0x1, 0x1, 0x10, 0xe}, {0x2, 0x5, 0x2, 0x5}, {0x1, 0x1, 0x4, 0x1}, {0x1, 0x4, 0xa, 0x4}, {0x2, 0x4, 0x2, 0xb}, {0x3, 0x5, 0x4, 0x8}, {0x3, 0x3, 0x7, 0x1}, {0x5, 0x1, 0x0, 0x6}], 0x10, 0x7}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001740)={@ifindex, r0, 0xd, 0x2000, r1, @link_fd, r2}, 0x20) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:31 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:31 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a2c1c265cb241224550304491f3c5b885813f683e729e3cfd0de6b27e44c1b4", 0x7d}], 0x1}, 0x90) 09:31:31 executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001140)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000000)=@raw=[@exit, @tail_call, @map_fd={0x18, 0x2, 0x1, 0x0, 0x1}], &(0x7f0000000040)='GPL\x00', 0x7, 0x1000, &(0x7f0000000080)=""/4096, 0x41100, 0x52, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001080)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000010c0)={0x1, 0xf, 0xffffffff, 0x9}, 0x10, 0xf023, 0xffffffffffffffff, 0x0, &(0x7f0000001100)=[0x1], 0x0, 0x10, 0x8}, 0x90) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001540)=@bpf_tracing={0x1a, 0x1c, &(0x7f0000001200)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x6}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @ringbuf_query], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001300)='GPL\x00', 0x6, 0xf0, &(0x7f0000001340)=""/240, 0x41100, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000001480)={0x5, 0xe, 0x40, 0x5}, 0x10, 0x2ca21, 0xffffffffffffffff, 0x1, &(0x7f00000014c0)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000001500)=[{0x4, 0x4, 0x10, 0xc}], 0x10, 0x7a}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001700)={@cgroup, 0xa, 0x1, 0x6, &(0x7f0000001600)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001640)=[0x0, 0x0, 0x0], &(0x7f0000001680)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000016c0)=[0x0], 0x0}, 0x40) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001e80)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001e00), &(0x7f0000001e40)='%ps \x00'}, 0x20) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001fc0)={@ifindex, 0x24, 0x0, 0x2, &(0x7f0000001ec0)=[0x0, 0x0, 0x0], 0x3, 0x0, &(0x7f0000001f00)=[0x0, 0x0], &(0x7f0000001f40)=[0x0, 0x0], &(0x7f0000001f80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000003080)={@map=r3, r1, 0x2a, 0x0, 0x0, @prog_id, r4}, 0x20) (async) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000017c0)=@generic={&(0x7f0000001780)='./file0\x00', 0x0, 0x30}, 0x18) (async) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a40)={&(0x7f0000001900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x100, 0x100, 0x6, [@struct={0xb, 0x7, 0x0, 0x4, 0x0, 0x2, [{0x1, 0x5, 0x9}, {0xb, 0x5, 0xca}, {0x8, 0x0, 0x7c}, {0x5, 0x2}, {0x0, 0x1, 0x18}, {0x6, 0x2, 0xffffc6b8}, {0x1, 0x0, 0x800}]}, @enum={0x5, 0x8, 0x0, 0x6, 0x4, [{0x10, 0x7}, {0x7, 0x1}, {0x10, 0x72}, {0x9, 0x4}, {0xe, 0x7}, {0x9, 0x1}, {0x9, 0x5}, {0x2, 0xf92}]}, @union={0x1, 0x3, 0x0, 0x5, 0x1, 0x6, [{0xa, 0x1, 0x101}, {0x6, 0x2, 0x20}, {0xa, 0x0, 0x101}]}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xf, 0x4}, {0xd, 0x1}]}]}, {0x0, [0x30, 0x30, 0x0, 0x0]}}, &(0x7f0000002080)=""/4096, 0x11e, 0x1000, 0x0, 0xa80}, 0x20) (async, rerun: 64) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001b00)={0x0, 0x80000001}, 0xc) (rerun: 64) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001bc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000001b40), &(0x7f0000001b80)=r1}, 0x20) (async) r9 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001c00)={0xffffffffffffffff, 0x80, 0x10}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d40)={0x18, 0x16, &(0x7f0000001800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x40}, {}, {}, [@map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000018c0)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x16, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000001a80)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001ac0)={0x2, 0x2, 0x2, 0x1}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000001c40)=[r7, r8, r9], &(0x7f0000001c80)=[{0x1, 0x2, 0x0, 0x4}, {0x4, 0x1, 0x4, 0x4}, {0x1, 0x1, 0x10, 0xe}, {0x2, 0x5, 0x2, 0x5}, {0x1, 0x1, 0x4, 0x1}, {0x1, 0x4, 0xa, 0x4}, {0x2, 0x4, 0x2, 0xb}, {0x3, 0x5, 0x4, 0x8}, {0x3, 0x3, 0x7, 0x1}, {0x5, 0x1, 0x0, 0x6}], 0x10, 0x7}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001740)={@ifindex, r0, 0xd, 0x2000, r1, @link_fd, r2}, 0x20) (async, rerun: 64) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) 09:31:32 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) 09:31:32 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) 09:31:32 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, 0x0, 0x90) 09:31:32 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[0x1], 0x0, 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:32 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) 09:31:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:32 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:33 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 09:31:33 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 09:31:33 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, 0x0, 0x90) 09:31:33 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 09:31:33 executing program 1: getpid() 09:31:34 executing program 1: getpid() 09:31:34 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, 0x0, 0x90) 09:31:34 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:34 executing program 1: getpid() 09:31:34 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[0x1], 0x0, 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:34 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb5, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x4e, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000340)=r1) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:34 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:35 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb5, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x4e, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000340)=r1) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:35 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb5, &(0x7f0000000100)=[{}], 0x8, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x4e, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000340)=r1) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:35 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x90) 09:31:35 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x1, 0x4, 0x8, 0x6, 0x1, 0xffffffffffffffff}]}, &(0x7f0000000040)='syzkaller\x00', 0xd81, 0x5b, &(0x7f0000000080)=""/91, 0x41100, 0x1c, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x71, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000180)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000001c0)=[{0x0, 0x3, 0x10, 0x6}, {0x3, 0x3, 0xb, 0x4}, {0x3, 0x5, 0xd, 0x9}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 09:31:36 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x1, 0x4, 0x8, 0x6, 0x1, 0xffffffffffffffff}]}, &(0x7f0000000040)='syzkaller\x00', 0xd81, 0x5b, &(0x7f0000000080)=""/91, 0x41100, 0x1c, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x71, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000180)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000001c0)=[{0x0, 0x3, 0x10, 0x6}, {0x3, 0x3, 0xb, 0x4}, {0x3, 0x5, 0xd, 0x9}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 09:31:36 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[0x1], 0x0, 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:36 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x90) 09:31:36 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:36 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x1, 0x4, 0x8, 0x6, 0x1, 0xffffffffffffffff}]}, &(0x7f0000000040)='syzkaller\x00', 0xd81, 0x5b, &(0x7f0000000080)=""/91, 0x41100, 0x1c, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x71, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000180)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0x1], &(0x7f00000001c0)=[{0x0, 0x3, 0x10, 0x6}, {0x3, 0x3, 0xb, 0x4}, {0x3, 0x5, 0xd, 0x9}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) 09:31:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001740), 0x4) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="fe2157508d822d5a04496a96656137b2df4537b30ebd9de007595436315b296f1e4e4eb6d90071e1be8a3fdefe5aad800551331737493aaec5d4a30b6fb12c79a6e16f004b05fbb89ab1d146fbe5f5bbe9a1ac70d1b1285183deaf284cc755ffef18fc7c61be2b1d2e762333cba6aad3eb28c44478f254a8dcded4f751b050e7da5261d2bfcc4e02f986ce9f4550dacca307564bf6cd458c73287054e54718fd82adad2e765814a47926ad1d92aefbb3d82b2176749842e6f3b61a7cb274f17ef653c449fd7d2b60d529540f9cb089ca5f047f47cdfa7584f75fbd2d6ea06cbd9f57e8eefe0e9601fb8c3bcc880a428d1adb9f63d3db65332c8bcfecef3d7083fb0615b8a9fe4666d7eb0b82246adcf4c3bf083530324cca9de5aaba3c3d6e15b869a20b19928610d6483469fdb3c528c5636f27089a15030d82322de1734bff66c1d244d9e8e2940f810ce1e9fd2559504f23dec317116f4093312189fee3019b6d2028360f2be893b171ad7197e87731c6435b039655d002559d0db00635f34cd1fb82d92f13925fee83a57a2876cf9f7e1a7b614862d5cdfa1bd6b93c0679c312f68d244db79b503556e731d956442b0a328ea06beae7ce664282e2b0f47a26e3371f77f8f98dd19b968026eccd8bd264c167bebf54fa4e5d5b36a6552db7245adac85a6268be5df3064f5a44767c44830cd9dc7a34baf1f6883bf9da5c280de6abd4e3c0e7081251c43cea35ed303f79ca6293c2c97588ea1753647ab4b7185f1edba32e0f9882300e681a5825218533955ab8a421c96559338e44b0cd09f7ae87bf456b22c8e7b614548b0d5074aba3d76a0078f199ab4940eaf9b744247aa89fb060f17116b8aa2a9783c0b0c247d3202ee6d3ef3341e8e7a3089b0706c5807c1c5c7477135b41349c675d873a447fe933cb14ddd86702f9f256a7a21db00f7f66805c00fd869e4016bcaff8f01b7082c83f4c9e3b79ff5ea2af86d9465c2887944ccb89195df29a0d298c84dfa2ea27af12cca1d66ca592e73177d3a7de333781330dc24d811dfca1878122d0bf7ba6d196a0eedce7cd47ec977241f82af2b18331f01fade19f131ae9f58d35532f5c1f6d25a6dabf2dce77b0dbb3e38404c3c8dfbe239f9fdcf9b304ee4413bb97a7ecd518b207f7405e7c098715c4786d2194684ea51c55a026bc99863ee7e596115b9aaa9f4f53b7a30491fb914c7bc05b806846dfc984b6cb6454d6ac07e483ddd0e3adbb0ffb636566d4f1d6692ceadf3ac16ce4c67b7551e556cec4cc6934a884b6727884968d6e150fb35dedfc17c3c31caea8ed5a73e3e2f07c01f26cd4ed437d92cb4091b7c0ca14a0b0935d3c98b9d76a3432edebadd03997fd0a0c9f838a2aa29c8b6ffbff4a135e80d1b19e6d01de255e00c4ef4a0d10a7467325f9af98c996e28f479cf4b6de8efbe6e3b508ca1e4d3b3e123db579c6edb66d035d8152ee1cd8ee142321f5cbde6fb4188b4ed41766b3787555adf4637d678647466b828834b971fcfa13a00931a5696d9660024e3ed710fafe8fb8c17f035a488546fd0e9c099713dddc1f96f5ae4bce916bf51b82b3b1a018f38d397e2bd1c54623ee4332bb67b39c0a30de088ec567025f80fff3453e400acb7fbefa125b9cc14497dee235491faf03969524d7bb7bf1f4edf0d93a603babe2fa2360280890d381c43c0d4754369a5edd9a34a07b9a0c844e34efa884ebbb4e438ac563f8667e6b7e8cc79d761ad58eb66b409ec38b88bce0ffa1b5f7cda39767a89a99c5509bd13816bcfec502bee1a1b5b2c4f682a55f30f4c993682e88b3b165d67e1656667d4716bd88b43e71df64009f3412958af1ce1e773635e0ae304b8250be119e403a60a0b93c1f1e083dde6b372446ba7fc79f8f4b823a8ff99b9a222b0264e41368f6a23c1bbede42eb272a03772e4cfa0978ee2d4aeb3626f8c515242b027a2bb0d81bc25c73df6f8fa469ed62b0d5890e02ad66d15a44ac4f0e1e221c4a5d0eee3499b2fb3d7e9e86d506d4bf8bc9bd55ade684ff8bea456b9c1cd40cbd528d4d8e988f298d17deaf73f5b5aca3c9ec54ea0a1bd6cc0a02ffb2b3463b84ff78dd68fbf0fea4e750212335612e8fe246b82ceb718d19eb6bbae5842f0d08f7330d735277264b853cb9a61a058895dd145eede7bea95939e6a0d11db6a531ca70e8dcc2c0092420ef52c851166adc52ef1f55b24bef75a0ec4119fcfdaa41b219141b70ba03a530e0f944a902216faf0b411986feb9010e68164d86b1aa4a3f6917903572dacad784b079281d11e51aecde8644dd7b2dfb93bbb115e1707b8bcd4cf794c61b5f0e581cc4a484d8438dc8ffc83fce3bd2c98d63f322d074aaf6410c973667d8cd55574d5840c48c8ae0bd103d7370c2f53c0e5747540a2e071010bb644af01b1269c6650192cb1fda4ebe8269104b41caa60b6ce9f2218672e9ecdb971cc6828a681532debb410ca2875ef9dc5c412e3faeb3d0df1e47bcca5126dd970e21bbacc8ef0150095ceb88faeb20fd4c8cd862f66736dd06420e19685fd89afb2e12e0f397c33b06bd323f3e4fbe1dcb6b44f5df6f33dd8db40ed15abd6eac1c50c1094a2ea3ad599ac035c96ef914bc25b2d049c848a1df42c8720b814457d685c4bbbff00acb004aa82df09e9a0c5ac9da09528b351550a734674b9734f444cd92ba9edbf8bb5149f306057c9b6b6fcbfcfc0d3fa39e1462967683c8299f817ced59db066bcf2b47162e29bee19ce2b8a268c7f0f26f834229709e48b4b37a8e2ea0382735824acc387b011a88a99295db5238628c7a26becd9a05fe979d2c6dbf213935b0d5d755d15cfcf8ef88feed21c637b8235000d78b69b17693928e577eacde3588d6b4ddd28687a7d4c41b0dada5f2348c1e2515193e15477ab88d751aef40a5db2b92b3e6d706bd49e3b6d1fa1de3f34a7782414231b81bb8ba0dca0f2c450093683ebc44f01713ea591da969ac75051328dc66a2b868d7e24c8ce371370c036e63a668d7a5866a6e2b1680defda260c22782a57c729dd97a5ccd63edfbf8a554862bbb8386576aede740334232a7e0f4f4b9fc8aa6201a970b2572702ddd07844ca136d24682c5e2b09d3a7dfcc2f254f181d5925698414e170ebd837aec776a1b8c9528435d7ccff990f5bc2a33f4d94a63bb47c3494e111d6faef4eaaa552630fefe015a6304c7d66b674088ae9c29d2a64bffc89e089026f0d6bb761e841164148c616c27c2b30603504dbaba357cdde1e3e4e396420c1eb4371f166c57351fe944f068fd97b18a04cf3fc0fbad8fcd4d1825d0c3e15465aa385c633215d105b88ee4c990b1f814fb3b09bedf15e0b1affb869517f5aaf87bd856329c77561d84c8ef9da489d52ed86445679e43e075a5b48240045f05695a2961d295669bc8e5b4e5bac15cf646c81159cc6a2c82e23a3a8cde44c5160937013d8d604a8d4e8e7a3154151a2f5431d743baf525a8648f69a8ddc7c71db83561f63decccbd543c290282f4324da8e0e9c6d505218dbbc2c0fd74db927013c622b05a062bb02a9357c14d3fe4b981e86cab02294df33b92957585238ca4485359c11b8e196c541abd7a28867fa472df923e826710f395a73dfdffb4db752d9432f185e2f0b7c7a9195ee6fd1fec9fb390895878f8d25cddb7def5669435ddf8c3f078f6ab8266231e7522c8b36a5352cbff931b5666d2dd43f7963f2344866b79e8e7f368ec948e82810e3debb9c606287e496628957b339e0704e51e4162a3f354860d7a6e72298c8c88fd4d43bb3b554744c5e0dd1e0a27e69dd67a160310d83e9ecdfd94c09e7f2aa4f12e1f34b3a1aeb29374726ab531339a2bf766bb37a20f50bd63884ecc670f2f4836f33338135f999daff33ffab99ca05c6f8f1a0ccde4bf7a59a8b876464754dec879b1470954583afb206a271efde267d7f0dff459998809ae9a957265dbf84b053d4183d055830ee30bed2aac131369d597b32f620c2bf9d12b802acf815a7b84d50623505c2579bb3a1b83f1dda7340f3d5c4da77a33ad9e29d15adf1241fa2e6ba045384b9e151f7e29b122e7132a58d95a290d411d172cba7a5f3eb01e59f32947d7b934a31d7045cd77736618514a0a6efd263feaa09c477fbf2306049c96a94631e3b450339c48bb8b4f5c506952b2edf397b8795996e596aceef1764fce8e113f1a961db3adaf44bc241542999c279a0d09d34a29e992f732a4ced82400253f207d0aae939ed92e034ea7138f4d9f4d5d99e5f5003978d9f4df745efc52b5582c659a4febfc3be2f302248c19f5d1b1b28596b5a2c849aee4597212fc962b22b737148eaeb11229ff1a43a3bf68bd72a37a0e4250cb3848172d2f0846b77d779cf637124c878cee4127435cecec989b29d4ab635129e6ce72453e1d8cee9126c8f8aaa381a1dabc66cf6435ce9e76bef90654dab8827498e72c4b6e93cfcbb8ed6890a82e0bc161b85c3e65facf21be79c83e1693d538efe6d55964383de9befe867fb7e372f824369e196d98d174a10a215caafbb6036bda00712503d3a505b8f32ad4d0bf69c3daa385319a9355fa8b28028a85a0413dc73e33522e52622ec38b523973bf64c5963aa9b3f66663c93275031828011002bb8fd7a561d308dba2a4ddabd5dd578200da7c4ad81256c5306a04674d80bdda611da616bb382a845261372a2a1532fee018f39e0a625262c5c688d2f137ffde910f4a8bd9b29cf6860313abf1440b3201b3cd8b77d6d28a4581b6b26cf43f0234887b2225669ddfa47e2ce65e71930ded6f27a6f47dcd85806181b3521b374c2141c7af3b0be0fa8e4f8a62bec3709e45fa40b5432a83fb1af9948a7a5a8bec3139b6bae9cfd5440fd6edb8d2cef0bbe1c47d8e74759a366678ba2d560c43520348e0139b0372b9da56c071ca7ae0b58dc2149c7edc2ecf13fa1142018b3ac8028ac2de24c4db2db3c0cb1ffacb6db9b02d57859c38c060540276f3d5ba3e24e99d3e464aa0ac95ade6c537b570bd9c5118df40f714c0fc735b1e3741bb740471f151cc19662496e0c788b815fcc47aff766040b3e2d3378e25ab6113bd0d64a3aff0189f30a172dfcf741b70cb66032d3922dad879fff9906bf813e5691d00117511c9de2c2efeefe0d0a2afa7d7330559149518f61750643b33cfaea72078666082233d1f9f84bd94f030646445376764e58718f87e83749d91da2ef70b87cb7502866cc1a11ff2520ce1110748cc147596a3a7816bfe19ba393fe2b89c620020e10a7c059c622f101c3bce31c8aa22687eafb212c26bc02f3078f43f12c7e1d830a76c49941b38a3a33f4dc3edf22440efbcad458254f6f2d65ef532bb548f0a928fc286f6bfe7d4ba5966cddf74c3020ad717be42b6b70991c0edb8db989dc23de2149d1a79ef9d30eff7aa7e4ea7f622eb5f6e61b0bee2510e5857398bb832c98e93151197c3e15e1e217882a39f4c62e77e03fad3e7e3e79c1d81cd219204de84ade054a29d6d17cef13dec1dda8ebfeadc34f25e69f3481d226d823950ac6fd0ce427b69b19c665ee4e0a600915afe8d858f82654a4567e2676443d646b2efbe39b4ef04878749831e39290d3b99007a5c3e4be7a1a80478d6510a7c559097bb094461107c45a198b076c68ad227c6d587498b1cc4b1c36e57067deaecea18b9bb920d51bb4a91ef3c64dd58c1218e73d1ef45ae15cc2d1d99d9b01e2cdbfbd88c838a922be3aba82de5ee9c180c9806055dbd5c37a1011165aa20e3bda415a6", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:37 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001740), 0x4) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001740), 0x4) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001740), 0x4) (async) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) (async) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 09:31:37 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x90) 09:31:37 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x193840, 0x0) close(r0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'ip6_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 09:31:37 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:38 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x193840, 0x0) close(r0) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'ip6_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 09:31:38 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:38 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x193840, 0x0) close(r0) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'ip6_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 09:31:38 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') 09:31:38 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x90) 09:31:38 executing program 1: r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7ff) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') 09:31:38 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x7ff) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') 09:31:39 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x4, 0x2, 0xc2, 0x0, 0x0, 0xfff, 0x10, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x80405, 0x3, 0x72bb2207, 0x1, 0x0, 0x5, 0x3, 0x0, 0x5347, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe38c) 09:31:39 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x4, 0x2, 0xc2, 0x0, 0x0, 0xfff, 0x10, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x80405, 0x3, 0x72bb2207, 0x1, 0x0, 0x5, 0x3, 0x0, 0x5347, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe38c) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x4, 0x2, 0xc2, 0x0, 0x0, 0xfff, 0x10, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x80405, 0x3, 0x72bb2207, 0x1, 0x0, 0x5, 0x3, 0x0, 0x5347, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe38c) (async) 09:31:39 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x4, 0x2, 0xc2, 0x0, 0x0, 0xfff, 0x10, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x80405, 0x3, 0x72bb2207, 0x1, 0x0, 0x5, 0x3, 0x0, 0x5347, 0x0, 0x3}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe38c) 09:31:39 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x193840, 0x0) close(r0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'ip6_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 09:31:39 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x193840, 0x0) close(r0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'ip6_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 09:31:39 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x193840, 0x0) close(r0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'ip6_vti0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) 09:31:39 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x90) 09:31:39 executing program 1: perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x193840, 0x0) 09:31:39 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x193840, 0x0) 09:31:39 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:39 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:39 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x193840, 0x0) 09:31:40 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x193840, 0x0) 09:31:40 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x193840, 0x0) 09:31:40 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 09:31:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:40 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x90) 09:31:41 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x90) 09:31:41 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x2, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:42 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x90) 09:31:42 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:42 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x0, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:43 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x90) 09:31:43 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x0, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:44 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x90) 09:31:44 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:44 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:44 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 09:31:44 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x0, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:45 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x90) 09:31:46 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x90) 09:31:46 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150", 0x3f}], 0x1}, 0x90) 09:31:46 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:46 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150", 0x3f}], 0x1}, 0x90) 09:31:46 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:46 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150", 0x3f}], 0x1}, 0x90) 09:31:47 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x0, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:47 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150ad9c56a4215a2f2846eef5d69e3651c0aa6b5a03bbefeb62163e30fafcfc8a", 0x5e}], 0x1}, 0x90) 09:31:48 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c730794967ce1b763c1f4d3668d7ce32f3052295d1fa7a6230b764f766f56d17e620150", 0x3f}], 0x1}, 0x90) 09:31:48 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:48 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x0, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:48 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 09:31:48 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:48 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:49 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d433dc2ff758a0d2deffb8cb54e0df762248e5e8eb64b761018bf30c73079496", 0x20}], 0x1}, 0x90) 09:31:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001740), 0x4) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001740), 0x4) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001740), 0x4) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) perf_event_open(&(0x7f0000002000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:31:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001740), 0x4) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:50 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d4", 0x1}], 0x1}, 0x90) 09:31:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:50 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:50 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:50 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:50 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:51 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x0, 0x8, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:51 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x90) 09:31:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:51 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:51 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001640)=[{&(0x7f00000000c0)="457e730a0cfd0084614aeaa7e065a939599a546e6da274c1d6cfee8831e2", 0x1e}, {&(0x7f0000000100)="2e5afbd64912946e48d9fba7912cd6d51087e4b4f0ee7b2524f0fafcff2c5251e67fcbcf357fec0ca3de24396dfe46b0c0bc7ec44cdb19cb2f21122b48e2554ada239c5fd36dfddc4bb89228bd5f1ce8b36f7a2bb7ac8a8e425482eb5adbb21944cfe8244f1d6288b2e4a992215e2cdd29ab3c1597bb9e08b71739bedd", 0x7d}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="1c0c777b5c3ace6d685bb15fbcbf426c2d7401e0327a317380d96ad547b03a9b157089014cd9c510eab90fb766c65476669a39d534d95f9d6b40dd92ad872b98a7baac1a9d0cdb1e1f397245d6986eddc7fdbca5598965415d0f2c5ad85101cbd226f1ac5d19e7e781b0b0ec23b2a27a0a8e5dfe791bf145", 0x78}, {&(0x7f0000001200)="729ebd27026234bf60d8adcd67710f698cc73739ae7f707f9b2eed3b393b824d63dfa78a3d3bc8714bb320ad840fd56a25b0b22095c64bb0144f40d0ef2dea554b03f427ce48b1b4e128d29c3de54fd17231b2391681ee4c25bfe648eba9cdc4a8fa35730f370121ad3e24e2a6c494c27fa25af781a34c65238d61ca48eebcf917", 0x81}, {&(0x7f00000012c0)="bfec6d53ddd0422e54434c3b53c8b99df6394b3df06f9b4d954f418b58cb06535ea4d117402ef5682498c1c827828d338f910747e8f77e95199ff44b9f7aecbd135d3a55923b02b8d4616d4bb5aa6cc9e14fb04c6d0855e873bbe277545a73b2e8cd652eab9c0407b4e9543218ba47b2b289b477ff04b453739fb37a3f8038c4393deced7b1ff29e95e4951268f1a1b7faea451c5c7e597beffa76eeed3aa88cdb", 0xa1}, {&(0x7f0000001380)="4d8c6bd95914ca41373f1499e9a62f108f6d20a2e7d5bc453af3f32e8a4662b20ff930e6d18087e9e2d093778c188e1896488d157284973e8face5a13e9d0937cf43f910552742ce3e0439805bb0e0059a838f2e5efb542c7d88e7bc07fee9eefdd30427541b1683ce9f5e96be849d30c134d6bf19412e64f40e5ac6eeb184dd2d2cd379a65671", 0x87}, {&(0x7f0000001440)="ba4b027471fe35da07a6875073bca1b30517c5ba75b2f015dc6c3131ac8d52a4d7a91a4afe3b66f8e6", 0x29}, {&(0x7f0000001480)="0583f19034e5e6eec62ca8a8d6c351cf6c4133149de0e05cce456025cd77888d53297ac8f5e3c72312b6c3d9c9c43e2daf6be005d4ae2ad476c122557f9009d5c228c0ef1c395eb59660b96859779a286cbbc486a88653d90892e0d7f2ad376941251a8841df6c0f98db6ea95508239886a968ed956d3818a3612c2aeb762f8001fa879ff895d9c1d8eff04316f48782ed", 0x91}, {&(0x7f0000001540)="e59420af1da465bc7e334cd774a5ade58f77bb23212bb9ba31143e346679dc2fa97c8253aefd3d3da3f3543e706187c3c62cdf70387f5994d014a46812a095a6487047dcfda99d1375bf23731b19cb349dca8203961f3d5abcae6a1b12f25efcaa87bb1220984052df255bee2ac3a15d469796879edb0ba8263b67e8cd584bab2e2a1e322cb79b44f66b12925ac40c3967fb84b1740f74558df20f49567aac07fb8475cf6bfbad426ee36433794ee6cdc3e70b642908fd240e53f1772077d22cb9fe890f010468", 0xc7}], 0xa, 0x0, 0x0, 0x900}, 0x8000) 09:31:51 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x0, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:52 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x90) 09:31:52 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:53 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x0, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:53 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x90) 09:31:54 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:54 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d4", 0x1}], 0x1}, 0x0) 09:31:55 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed92181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:55 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x0, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:55 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d4", 0x1}], 0x1}, 0x0) 09:31:55 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:31:55 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 866.194504][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 866.225735][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 866.236262][ T144] device bridge_slave_1 left promiscuous mode [ 866.243157][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.251942][ T144] device bridge_slave_0 left promiscuous mode [ 866.258320][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.270504][ T144] device hsr_slave_0 left promiscuous mode [ 866.277120][ T144] device hsr_slave_1 left promiscuous mode [ 866.283816][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 866.294057][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 866.322838][ T144] device bridge_slave_1 left promiscuous mode [ 866.344882][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.372348][ T144] device bridge_slave_0 left promiscuous mode [ 866.378570][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 09:31:56 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000000c80)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="d4", 0x1}], 0x1}, 0x0) [ 866.926041][ T144] device hsr_slave_0 left promiscuous mode [ 866.940710][ T144] device hsr_slave_1 left promiscuous mode [ 866.947569][ T13] Bluetooth: hci6: command 0x0406 tx timeout [ 866.952030][T26911] Bluetooth: hci7: command 0x0406 tx timeout [ 867.065735][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 867.097258][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 867.118621][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 867.178892][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 09:31:56 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed92181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 867.289501][ T144] device bridge_slave_1 left promiscuous mode [ 867.295875][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 867.449552][ T144] device bridge_slave_0 left promiscuous mode [ 867.456366][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 09:31:56 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 867.556200][ T144] device bridge_slave_1 left promiscuous mode [ 867.571297][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 867.616883][ T144] device bridge_slave_0 left promiscuous mode [ 867.641708][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.857833][ T144] device hsr_slave_0 left promiscuous mode 09:31:57 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed92181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 867.952940][ T144] device hsr_slave_1 left promiscuous mode [ 868.121642][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 868.159319][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 868.193584][ T144] device bridge_slave_1 left promiscuous mode [ 868.199985][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.283303][ T144] device bridge_slave_0 left promiscuous mode [ 868.299974][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 09:31:57 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 868.550504][ T144] device hsr_slave_0 left promiscuous mode [ 868.574857][ T144] device hsr_slave_1 left promiscuous mode [ 868.588252][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 09:31:58 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed92181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 868.642491][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 868.714781][ T144] device bridge_slave_1 left promiscuous mode [ 868.721302][ T144] bridge0: port 2(bridge_slave_1) entered disabled state 09:31:58 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed92181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 868.890664][ T144] device bridge_slave_0 left promiscuous mode [ 868.902666][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 869.070454][ T144] device hsr_slave_0 left promiscuous mode [ 869.107541][ T144] device hsr_slave_1 left promiscuous mode 09:31:58 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 869.136498][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 869.179765][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 869.281388][ T144] device bridge_slave_1 left promiscuous mode [ 869.302608][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 869.444851][ T144] device bridge_slave_0 left promiscuous mode [ 869.465435][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 09:31:59 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:31:59 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 869.811860][ T144] device hsr_slave_0 left promiscuous mode [ 869.844933][ T144] device hsr_slave_1 left promiscuous mode [ 869.913369][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 869.955327][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 869.975954][ T144] device bridge_slave_1 left promiscuous mode [ 869.992003][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.998448][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 09:31:59 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 870.005645][T26850] Bluetooth: hci0: command 0x0409 tx timeout 09:31:59 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 870.062372][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.070945][ T144] device bridge_slave_0 left promiscuous mode [ 870.078937][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 09:31:59 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 870.411122][ T144] device hsr_slave_0 left promiscuous mode [ 870.611767][ T144] device hsr_slave_1 left promiscuous mode 09:32:00 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:00 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 870.767012][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 09:32:00 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:32:00 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 871.496500][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 09:32:01 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x0, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 871.726928][ T144] device bridge_slave_1 left promiscuous mode [ 871.754598][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.071619][ T1066] Bluetooth: hci0: command 0x041b tx timeout [ 872.093833][ T144] device bridge_slave_0 left promiscuous mode [ 872.100428][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 09:32:01 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x0, 0x5}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:01 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) 09:32:01 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:02 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000900000085000000060000001815", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 872.619743][ T144] device hsr_slave_0 left promiscuous mode [ 872.626800][ T144] device hsr_slave_1 left promiscuous mode [ 872.635902][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 872.697853][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 872.708585][ T144] device bridge_slave_1 left promiscuous mode [ 872.777524][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.868931][ T144] device bridge_slave_0 left promiscuous mode [ 872.906280][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 874.141608][T26910] Bluetooth: hci0: command 0x040f tx timeout [ 874.414192][ T144] device hsr_slave_0 left promiscuous mode [ 874.492425][ T144] device hsr_slave_1 left promiscuous mode [ 874.539190][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 874.571757][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 874.672597][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 874.680346][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 874.882922][ T144] device bridge_slave_1 left promiscuous mode [ 874.889263][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 874.939829][ T144] device bridge_slave_0 left promiscuous mode [ 874.976319][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 09:32:04 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000900000085000000060000001815", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 876.222362][T22334] Bluetooth: hci0: command 0x0419 tx timeout [ 876.595564][ T144] device hsr_slave_0 left promiscuous mode [ 876.825408][ T144] device hsr_slave_1 left promiscuous mode 09:32:06 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000900000085000000060000001815", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 877.053710][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 877.191630][ T1066] Bluetooth: hci8: command 0x0406 tx timeout [ 877.520125][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 877.560746][T28434] cgroup: fork rejected by pids controller in /syz2 [ 877.765720][ T144] device bridge_slave_1 left promiscuous mode [ 877.789008][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 878.714775][ T144] device bridge_slave_0 left promiscuous mode [ 878.721203][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 09:32:08 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000181500", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 880.981447][ T144] device veth1_macvtap left promiscuous mode [ 880.989470][ T144] device veth0_macvtap left promiscuous mode [ 881.028921][ T144] device veth1_vlan left promiscuous mode [ 881.068080][ T144] device veth0_vlan left promiscuous mode 09:32:10 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000181500", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:13 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000181500", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 884.043877][ T144] device veth1_macvtap left promiscuous mode [ 884.049963][ T144] device veth0_macvtap left promiscuous mode [ 884.081466][ T144] device veth1_vlan left promiscuous mode [ 884.103891][ T144] device veth0_vlan left promiscuous mode 09:32:15 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r0, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:17 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r0, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:20 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r0, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:20 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8}], 0x10, 0x3f}, 0x90) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:23 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r0, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 894.863216][ T1066] Bluetooth: hci1: command 0x0409 tx timeout 09:32:25 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r0, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 896.941646][ T13] Bluetooth: hci1: command 0x041b tx timeout 09:32:27 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:27 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0x13, &(0x7f0000000840)=ANY=[@ANYBLOB="186100000900000000000000870ac2b9f0af000002004000000000000600000018000000ffff000040000000090000eae20bf27b8a00000000b70800013f0000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200d100"/124, @ANYRES32=0x1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000"], &(0x7f0000000900)='syzkaller\x00', 0xffffff00, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0xb, 0x25, 0x9}, 0x10, 0x0, 0x0, 0x3, &(0x7f00000009c0)=[0x1], &(0x7f0000000a00)=[{0x4, 0x1, 0x0, 0x5}, {0x2, 0x4, 0xf, 0xa}, {0x3, 0x4, 0x8, 0x5}], 0x10, 0x3f}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x8, 0x1}, 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000c00)={0x1b, 0x0, 0x0, 0x53, 0x0, 0x1, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x48) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000b00)={0xffffffffffffffff, 0x6, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', r1, 0x2e, r2, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000cc0)=[r4, r5, r6], 0x0, 0x10, 0x40}, 0x90) r7 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r7, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) recvmsg$kcm(r7, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) r8 = syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000e00)='./cgroup/syz1\x00', 0x1ff) r9 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f00000000c0)='ext4_es_lookup_extent_exit\x00'}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r8, r9, 0x0, 0xa, &(0x7f00000001c0)='H*)::[.^%\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r8, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='H*)::[.^%\x00'}, 0x30) [ 899.021631][ T3519] Bluetooth: hci1: command 0x040f tx timeout 09:32:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r0, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 901.101649][T25278] Bluetooth: hci1: command 0x0419 tx timeout [ 901.432050][ T1066] Bluetooth: hci2: command 0x0409 tx timeout [ 901.438135][ T1066] Bluetooth: hci3: command 0x0409 tx timeout 09:32:31 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 903.501670][ T13] Bluetooth: hci3: command 0x041b tx timeout [ 903.512163][ T13] Bluetooth: hci2: command 0x041b tx timeout 09:32:33 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 905.581631][ T13] Bluetooth: hci2: command 0x040f tx timeout [ 905.587789][ T13] Bluetooth: hci3: command 0x040f tx timeout [ 907.661669][ T13] Bluetooth: hci3: command 0x0419 tx timeout [ 907.670895][ T13] Bluetooth: hci2: command 0x0419 tx timeout 09:32:37 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:41 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:45 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:47 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:50 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcff", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:52 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcff", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 922.737217][ T144] team0 (unregistering): Port device team_slave_1 removed [ 923.170210][ T144] team0 (unregistering): Port device team_slave_0 removed 09:32:52 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcff", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 923.840942][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:32:53 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300000000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 924.667260][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:32:54 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300000000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:54 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300000000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:55 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300"/39, @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:56 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300"/39, @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:57 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300"/39, @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 928.196994][ T144] bond0 (unregistering): Released all slaves 09:32:57 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300000000000000000000001818", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:58 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300000000000000000000001818", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:32:59 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff185200000300000000000000000000001818", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 931.425982][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.433132][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 09:33:01 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff18520000030000000000000000000000181800", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 933.255519][ T144] team0 (unregistering): Port device team_slave_1 removed 09:33:02 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff18520000030000000000000000000000181800", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 933.677041][ T144] team0 (unregistering): Port device team_slave_0 removed [ 934.552185][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 934.865266][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 935.496346][ T144] bond0 (unregistering): Released all slaves 09:33:05 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff18520000030000000000000000000000181800", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 935.901744][ T13] Bluetooth: hci4: command 0x0409 tx timeout 09:33:05 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], 0x0, 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:07 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], 0x0, 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 937.981608][ T3526] Bluetooth: hci4: command 0x041b tx timeout 09:33:07 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], 0x0, 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 939.320410][ T144] team0 (unregistering): Port device team_slave_1 removed 09:33:09 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 939.663079][ T144] team0 (unregistering): Port device team_slave_0 removed [ 940.071692][ T3519] Bluetooth: hci4: command 0x040f tx timeout [ 940.105828][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:33:09 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:10 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:10 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 941.020830][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:33:10 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 942.141692][ T13] Bluetooth: hci4: command 0x0419 tx timeout 09:33:12 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:13 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 944.308823][ T144] bond0 (unregistering): Released all slaves 09:33:13 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:14 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:14 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:15 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 945.872456][ T144] bond0 (unregistering): Released all slaves 09:33:15 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:16 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:16 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:17 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:18 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 949.518166][ T144] team0 (unregistering): Port device team_slave_1 removed [ 949.742540][ T144] team0 (unregistering): Port device team_slave_0 removed 09:33:19 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 950.150871][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:33:19 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 950.877211][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:33:20 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:21 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:22 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 953.479072][ T144] bond0 (unregistering): Released all slaves 09:33:23 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:24 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:24 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:25 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 956.818663][ T144] team0 (unregistering): Port device team_slave_1 removed [ 956.858262][ T144] team0 (unregistering): Port device team_slave_0 removed 09:33:26 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 957.230575][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:33:26 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 957.860603][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:33:27 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:28 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:29 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 960.479181][ T144] bond0 (unregistering): Released all slaves 09:33:30 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 960.791887][ T1066] Bluetooth: hci5: command 0x0409 tx timeout 09:33:30 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:31 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:31 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 962.861606][ T3519] Bluetooth: hci5: command 0x041b tx timeout 09:33:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:32 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:33 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:34 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 964.941603][ T3519] Bluetooth: hci5: command 0x040f tx timeout [ 964.999207][ T144] team0 (unregistering): Port device team_slave_1 removed [ 965.572460][ T144] team0 (unregistering): Port device team_slave_0 removed 09:33:35 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 966.049537][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:33:35 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 966.462181][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:33:36 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 967.021865][ T13] Bluetooth: hci5: command 0x0419 tx timeout [ 967.261747][ T3519] Bluetooth: hci6: command 0x0409 tx timeout [ 967.351701][ T1066] Bluetooth: hci7: command 0x0409 tx timeout 09:33:37 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:37 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 969.252431][ T144] bond0 (unregistering): Released all slaves [ 969.341819][ T3526] Bluetooth: hci6: command 0x041b tx timeout [ 969.421742][ T3526] Bluetooth: hci7: command 0x041b tx timeout 09:33:39 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:39 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:40 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:40 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 971.421697][ T3526] Bluetooth: hci6: command 0x040f tx timeout [ 971.502556][ T3526] Bluetooth: hci7: command 0x040f tx timeout 09:33:41 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:42 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 973.511690][ T3526] Bluetooth: hci6: command 0x0419 tx timeout [ 973.581887][ T3526] Bluetooth: hci7: command 0x0419 tx timeout [ 973.667003][ T144] team0 (unregistering): Port device team_slave_1 removed 09:33:43 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 974.505862][ T144] team0 (unregistering): Port device team_slave_0 removed 09:33:44 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 975.262158][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:33:44 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 975.712051][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:33:45 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{0x0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:46 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 978.275080][ T144] bond0 (unregistering): Released all slaves 09:33:47 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:49 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:50 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:51 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 982.183970][ T144] team0 (unregistering): Port device team_slave_1 removed [ 982.212078][ T144] team0 (unregistering): Port device team_slave_0 removed [ 982.235747][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 982.294827][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:33:51 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:52 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 983.636650][ T144] bond0 (unregistering): Released all slaves 09:33:53 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:53 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:54 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:55 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:55 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x0, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:56 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:56 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:33:57 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 988.801232][ T144] team0 (unregistering): Port device team_slave_1 removed 09:33:58 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000), 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 989.772485][ T144] team0 (unregistering): Port device team_slave_0 removed 09:33:59 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000), 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 990.651439][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:34:00 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000), 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:00 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738", 0xa, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 991.422298][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:34:01 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738", 0xa, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:01 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738", 0xa, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 992.872116][ T1375] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.878682][ T1375] ieee802154 phy1 wpan1: encryption failed: -22 09:34:02 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996", 0xf, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:03 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996", 0xf, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:03 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996", 0xf, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 994.530866][ T144] bond0 (unregistering): Released all slaves 09:34:04 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7", 0x11, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) [ 994.941906][ T3519] Bluetooth: hci0: command 0x0406 tx timeout 09:34:04 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7", 0x11, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:05 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7", 0x11, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:05 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d1", 0x12, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:06 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d1", 0x12, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:06 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d1", 0x12, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:34:07 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 09:34:07 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) [ 998.772670][ T144] team0 (unregistering): Port device team_slave_1 removed [ 998.822580][ T144] team0 (unregistering): Port device team_slave_0 removed [ 998.846705][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 998.905737][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:34:08 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 09:34:09 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) 09:34:10 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) [ 1000.689304][ T144] bond0 (unregistering): Released all slaves [ 1001.901719][ T3519] Bluetooth: hci9: command 0x0409 tx timeout 09:34:11 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) 09:34:12 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), 0x0) 09:34:12 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), 0x0) [ 1003.991684][T22334] Bluetooth: hci9: command 0x041b tx timeout 09:34:13 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), 0x0) 09:34:14 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), 0x0) 09:34:15 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), 0x0) [ 1006.071747][T26910] Bluetooth: hci9: command 0x040f tx timeout [ 1006.373524][ T144] team0 (unregistering): Port device team_slave_1 removed 09:34:15 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), &(0x7f0000000080), 0x0) [ 1006.692875][ T144] team0 (unregistering): Port device team_slave_0 removed [ 1007.030356][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 09:34:16 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) [ 1007.535170][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 09:34:17 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) [ 1008.141702][ T1066] Bluetooth: hci9: command 0x0419 tx timeout 09:34:18 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)=@generic={0x0}, 0x18) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) 09:34:18 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) [ 1009.685420][ T144] bond0 (unregistering): Released all slaves 09:34:19 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) [ 1010.141872][ T27] INFO: task kworker/1:4:3564 blocked for more than 143 seconds. [ 1010.149897][ T27] Not tainted 5.15.151-syzkaller #0 [ 1010.185715][ T27] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1010.204161][ T27] task:kworker/1:4 state:D stack:23352 pid: 3564 ppid: 2 flags:0x00004000 [ 1010.222653][ T27] Workqueue: events switchdev_deferred_process_work [ 1010.229460][ T27] Call Trace: [ 1010.243284][ T27] [ 1010.246267][ T27] __schedule+0x12c4/0x45b0 [ 1010.250921][ T27] ? mark_lock+0x98/0x340 [ 1010.271621][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1010.277658][ T27] ? __sched_text_start+0x8/0x8 [ 1010.287887][ T27] ? __mutex_trylock_common+0x8d/0x2e0 [ 1010.301563][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1010.306921][ T27] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1010.313772][ T27] ? lockdep_hardirqs_on+0x94/0x130 [ 1010.319101][ T27] schedule+0x11b/0x1f0 [ 1010.331591][ T27] schedule_preempt_disabled+0xf/0x20 [ 1010.337029][ T27] __mutex_lock_common+0xe34/0x25a0 [ 1010.351585][ T27] ? switchdev_deferred_process_work+0xa/0x20 [ 1010.357722][ T27] ? mutex_lock_io_nested+0x60/0x60 [ 1010.371566][ T27] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1010.377605][ T27] ? print_irqtrace_events+0x210/0x210 [ 1010.388612][ T27] ? do_raw_spin_unlock+0x137/0x8b0 [ 1010.394182][ T27] mutex_lock_nested+0x17/0x20 [ 1010.398973][ T27] switchdev_deferred_process_work+0xa/0x20 [ 1010.411563][ T27] process_one_work+0x8a1/0x10c0 [ 1010.416649][ T27] ? worker_detach_from_pool+0x260/0x260 [ 1010.431568][ T27] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1010.437172][ T27] ? kthread_data+0x4e/0xc0 [ 1010.451578][ T27] ? wq_worker_running+0x97/0x170 [ 1010.456661][ T27] worker_thread+0xaca/0x1280 [ 1010.461362][ T27] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1010.471988][ T27] kthread+0x3f6/0x4f0 [ 1010.476121][ T27] ? rcu_lock_release+0x20/0x20 [ 1010.480985][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1010.501564][ T27] ret_from_fork+0x1f/0x30 [ 1010.506089][ T27] [ 1010.509269][ T27] [ 1010.509269][ T27] Showing all locks held in the system: [ 1010.520825][ T27] 1 lock held by khungtaskd/27: [ 1010.531559][ T27] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1010.541033][ T27] 5 locks held by kworker/u4:1/144: [ 1010.551558][ T27] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1010.571586][ T27] #1: ffffc900010bfd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1010.591561][ T27] #2: ffffffff8d9cfd50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1010.601319][ T27] #3: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1010.621678][ T27] #4: ffffffff8c923bf0 (rcu_state.barrier_mutex){+.+.}-{3:3}, at: rcu_barrier+0x9c/0x4e0 [ 1010.641575][ T27] 4 locks held by kworker/u4:2/154: [ 1010.646856][ T27] 2 locks held by getty/3258: [ 1010.652535][ T27] #0: ffff88814b004098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1010.670401][ T27] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1010.691569][ T27] 3 locks held by kworker/1:4/3564: [ 1010.696804][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1010.721582][ T27] #1: ffffc90003247d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1010.741560][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1010.761567][ T27] 8 locks held by kworker/u4:7/16902: [ 1010.767195][ T27] 3 locks held by kworker/1:3/26850: [ 1010.773472][ T27] #0: ffff888023eb3138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1010.801558][ T27] #1: ffffc900048c7d20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1010.812188][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1010.831578][ T27] 3 locks held by kworker/1:18/26911: [ 1010.836997][ T27] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1010.851558][ T27] #1: ffffc90004d6fd20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1010.871560][ T27] #2: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1010.880767][ T27] 1 lock held by syz-executor.3/28310: [ 1010.891548][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1010.911558][ T27] 1 lock held by syz-executor.1/28361: [ 1010.917061][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1010.931557][ T27] 1 lock held by syz-executor.4/28381: [ 1010.937148][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1010.961577][ T27] 1 lock held by syz-executor.0/28421: 09:34:20 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000dc0)='./cgroup.net/syz0\x00', 0x1ff) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000007c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0xd, 0x1b, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000ff0f0000000000000100000034168000fcffffff1852000003000000000000000000000018180000", @ANYRES32=r0, @ANYBLOB="00000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000018150000", @ANYRES32=0x1, @ANYBLOB="a30dea1ed8a8ed9218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085000000820000009500000000000000"], &(0x7f00000006c0)='GPL\x00', 0x7fff, 0x0, 0x0, 0x41100, 0x60, '\x00', 0x0, 0x2e, r1, 0x8, &(0x7f0000000800)={0x1, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000cc0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x0, 0x10, 0x40}, 0x90) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f0000000380)=[{&(0x7f00000002c0)=""/176, 0xb0}], 0x1, &(0x7f00000003c0)=""/245, 0xf5}, 0x738fe2bcee8572dd) syz_clone(0x20100000, &(0x7f0000000000)="7338f73e056533838738e283884996a4f7d11e", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) [ 1010.967081][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: tun_chr_close+0x3a/0x1b0 [ 1010.981556][ T27] 1 lock held by syz-executor.3/28466: [ 1010.987467][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1011.004041][ T27] 1 lock held by syz-executor.0/28552: [ 1011.014237][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1011.031575][ T27] 1 lock held by syz-executor.4/28554: [ 1011.037227][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1011.061559][ T27] 1 lock held by syz-executor.1/29029: [ 1011.067057][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1011.081212][ T27] 1 lock held by syz-executor.3/29137: [ 1011.091554][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1011.101070][ T27] 1 lock held by syz-executor.0/29190: [ 1011.148844][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1011.161724][ T27] 1 lock held by syz-executor.4/29193: [ 1011.167220][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1011.189225][ T27] 2 locks held by syz-executor.2/29359: [ 1011.195509][ T27] 3 locks held by syz-executor.2/29363: [ 1011.201084][ T27] 2 locks held by syz-executor.2/29366: [ 1011.207303][ T27] 2 locks held by syz-executor.2/29369: [ 1011.213783][ T27] 2 locks held by syz-executor.2/29375: [ 1011.219349][ T27] 2 locks held by syz-executor.2/29378: [ 1011.225416][ T27] 4 locks held by syz-executor.2/29382: [ 1011.231166][ T27] 2 locks held by syz-executor.2/29385: [ 1011.241571][ T27] 2 locks held by syz-executor.2/29388: [ 1011.247284][ T27] 2 locks held by syz-executor.2/29391: [ 1011.261585][ T27] 2 locks held by syz-executor.2/29394: [ 1011.267172][ T27] 2 locks held by syz-executor.2/29397: [ 1011.275011][ T27] 2 locks held by syz-executor.2/29402: [ 1011.280608][ T27] 2 locks held by syz-executor.2/29406: [ 1011.292022][ T27] 1 lock held by syz-executor.1/29410: [ 1011.297527][ T27] #0: ffffffff8d9db908 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1011.322239][ T27] 2 locks held by syz-executor.2/29412: [ 1011.327832][ T27] 2 locks held by syz-executor.2/29415: [ 1011.333880][ T27] 2 locks held by syz-executor.2/29418: [ 1011.339431][ T27] 2 locks held by syz-executor.2/29421: [ 1011.345718][ T27] 2 locks held by syz-executor.2/29424: [ 1011.351296][ T27] 2 locks held by syz-executor.2/29427: [ 1011.360676][ T27] 4 locks held by syz-executor.2/29430: [ 1011.369383][ T27] 2 locks held by syz-executor.2/29433: [ 1011.379154][ T27] 2 locks held by syz-executor.2/29439: [ 1011.389717][ T27] 1 lock held by syz-executor.2/29442: [ 1011.402353][ T27] 2 locks held by syz-executor.2/29449: [ 1011.407931][ T27] 2 locks held by syz-executor.2/29452: [ 1011.424710][ T27] 2 locks held by syz-executor.2/29456: [ 1011.430295][ T27] 2 locks held by dhcpcd/29458: [ 1011.445310][ T27] #0: ffff888073e68120 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x33/0xd50 [ 1011.463337][ T27] #1: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x350/0x740 [ 1011.484220][ T27] [ 1011.486627][ T27] ============================================= [ 1011.486627][ T27] [ 1011.504338][ T27] NMI backtrace for cpu 1 [ 1011.508703][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1011.516703][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1011.526760][ T27] Call Trace: [ 1011.530103][ T27] [ 1011.533242][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1011.538082][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1011.543732][ T27] ? panic+0x84d/0x84d [ 1011.547820][ T27] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1011.553093][ T27] nmi_cpu_backtrace+0x46a/0x4a0 [ 1011.558042][ T27] ? __wake_up_klogd+0xd5/0x100 [ 1011.562925][ T27] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1011.569083][ T27] ? _printk+0xd1/0x111 [ 1011.573245][ T27] ? panic+0x84d/0x84d [ 1011.577322][ T27] ? __wake_up_klogd+0xcc/0x100 [ 1011.582185][ T27] ? panic+0x84d/0x84d [ 1011.586269][ T27] ? __rcu_read_unlock+0x92/0x100 [ 1011.591306][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1011.597450][ T27] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1011.603645][ T27] watchdog+0xe72/0xeb0 [ 1011.607898][ T27] kthread+0x3f6/0x4f0 [ 1011.612114][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1011.617432][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1011.622042][ T27] ret_from_fork+0x1f/0x30 [ 1011.628412][ T27] [ 1011.631987][ T27] Sending NMI from CPU 1 to CPUs 0: [ 1011.641940][ C0] NMI backtrace for cpu 0 [ 1011.641955][ C0] CPU: 0 PID: 21515 Comm: kworker/u4:8 Not tainted 5.15.151-syzkaller #0 [ 1011.641973][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1011.641981][ C0] Workqueue: phy5 ieee80211_iface_work [ 1011.642080][ C0] RIP: 0010:deref_stack_reg+0x6c/0x110 [ 1011.642122][ C0] Code: 03 42 80 3c 20 00 74 05 e8 91 6a 91 00 48 8b 6b 10 48 89 d8 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 80 00 00 00 83 3b 00 74 18 <4d> 39 fd 77 13 4c 39 fd 76 0e 49 8d 47 08 4c 39 e8 76 05 48 39 e8 [ 1011.642133][ C0] RSP: 0018:ffffc900037770b0 EFLAGS: 00000202 [ 1011.642145][ C0] RAX: 0000000000000000 RBX: ffffc900037771a0 RCX: 0000000000000000 [ 1011.642155][ C0] RDX: ffffc900037771e0 RSI: ffffc90003777ef0 RDI: ffffc900037771b0 [ 1011.642165][ C0] RBP: ffffc90003778000 R08: ffffc90003777ef0 R09: ffffc900037771f0 [ 1011.642176][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 1011.642185][ C0] R13: ffffc90003770000 R14: ffffc900037771e0 R15: ffffc90003777ef0 [ 1011.642196][ C0] FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 1011.642208][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1011.642218][ C0] CR2: 00007fa78276bbd0 CR3: 00000000145b5000 CR4: 00000000003506f0 [ 1011.642232][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1011.642240][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1011.642249][ C0] Call Trace: [ 1011.642254][ C0] [ 1011.642260][ C0] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1011.642277][ C0] ? read_lock_is_recursive+0x10/0x10 [ 1011.642292][ C0] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1011.642307][ C0] ? unknown_nmi_error+0xd0/0xd0 [ 1011.642344][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1011.642358][ C0] ? nmi_handle+0xf7/0x370 [ 1011.642372][ C0] ? deref_stack_reg+0x6c/0x110 [ 1011.642385][ C0] ? default_do_nmi+0x62/0x150 [ 1011.642399][ C0] ? exc_nmi+0xab/0x120 [ 1011.642411][ C0] ? end_repeat_nmi+0x16/0x31 [ 1011.642457][ C0] ? deref_stack_reg+0x6c/0x110 [ 1011.642471][ C0] ? deref_stack_reg+0x6c/0x110 [ 1011.642485][ C0] ? deref_stack_reg+0x6c/0x110 [ 1011.642498][ C0] [ 1011.642502][ C0] [ 1011.642509][ C0] unwind_next_frame+0x12f1/0x1fa0 [ 1011.642619][ C0] ? worker_thread+0xaca/0x1280 [ 1011.642636][ C0] ? stack_trace_save+0x1c0/0x1c0 [ 1011.642674][ C0] arch_stack_walk+0x10d/0x140 [ 1011.642696][ C0] ? kthread+0x3f6/0x4f0 [ 1011.642710][ C0] stack_trace_save+0x113/0x1c0 [ 1011.642724][ C0] ? stack_trace_snprint+0xe0/0xe0 [ 1011.642738][ C0] ? kasan_unpoison+0x42/0x60 [ 1011.642769][ C0] ? __kasan_slab_alloc+0x43/0xc0 [ 1011.642806][ C0] ____kasan_kmalloc+0xba/0xf0 [ 1011.642818][ C0] ? ____kasan_kmalloc+0xba/0xf0 [ 1011.642829][ C0] ? __kmalloc+0x168/0x300 [ 1011.642841][ C0] ? cfg80211_inform_bss_frame_data+0x4f8/0x20f0 [ 1011.643034][ C0] ? ieee80211_bss_info_update+0x7a6/0xc80 [ 1011.643083][ C0] ? ieee80211_ibss_rx_queued_mgmt+0x175e/0x2af0 [ 1011.643099][ C0] ? ieee80211_iface_work+0x78f/0xcc0 [ 1011.643113][ C0] ? process_one_work+0x8a1/0x10c0 [ 1011.643127][ C0] ? worker_thread+0xaca/0x1280 [ 1011.643162][ C0] __kmalloc+0x168/0x300 [ 1011.643178][ C0] ? cfg80211_inform_bss_frame_data+0x4f8/0x20f0 [ 1011.643197][ C0] cfg80211_inform_bss_frame_data+0x4f8/0x20f0 [ 1011.643222][ C0] ? cfg80211_parse_mbssid_data+0x3410/0x3410 [ 1011.643246][ C0] ? __lock_acquire+0x1ff0/0x1ff0 [ 1011.643267][ C0] ieee80211_bss_info_update+0x7a6/0xc80 [ 1011.643288][ C0] ? ieee80211_rx_bss_put+0x60/0x60 [ 1011.643312][ C0] ieee80211_ibss_rx_queued_mgmt+0x175e/0x2af0 [ 1011.643328][ C0] ? mark_lock+0x98/0x340 [ 1011.643349][ C0] ? ieee80211_ibss_rx_no_sta+0x720/0x720 [ 1011.643363][ C0] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 1011.643380][ C0] ? lockdep_hardirqs_on+0x94/0x130 [ 1011.643401][ C0] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1011.643416][ C0] ? _raw_spin_unlock+0x40/0x40 [ 1011.643431][ C0] ? kcov_remote_start+0x76/0x490 [ 1011.643448][ C0] ? kcov_remote_start+0xf9/0x490 [ 1011.643463][ C0] ieee80211_iface_work+0x78f/0xcc0 [ 1011.643482][ C0] process_one_work+0x8a1/0x10c0 [ 1011.643503][ C0] ? worker_detach_from_pool+0x260/0x260 [ 1011.643521][ C0] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1011.643535][ C0] ? kthread_data+0x4e/0xc0 [ 1011.643554][ C0] ? wq_worker_running+0x97/0x170 [ 1011.643569][ C0] worker_thread+0xaca/0x1280 [ 1011.643584][ C0] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1011.643622][ C0] kthread+0x3f6/0x4f0 [ 1011.643637][ C0] ? rcu_lock_release+0x20/0x20 [ 1011.643651][ C0] ? kthread_blkcg+0xd0/0xd0 [ 1011.643665][ C0] ret_from_fork+0x1f/0x30 [ 1011.643687][ C0] [ 1011.728048][ T27] Kernel panic - not syncing: hung_task: blocked tasks [ 1012.118411][ T27] CPU: 1 PID: 27 Comm: khungtaskd Not tainted 5.15.151-syzkaller #0 [ 1012.131008][ T27] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1012.141226][ T27] Call Trace: [ 1012.144544][ T27] [ 1012.147523][ T27] dump_stack_lvl+0x1e3/0x2cb [ 1012.152225][ T27] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1012.157889][ T27] ? panic+0x84d/0x84d [ 1012.161985][ T27] panic+0x318/0x84d [ 1012.165895][ T27] ? schedule_preempt_disabled+0x20/0x20 [ 1012.171555][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1012.178626][ T27] ? fb_is_primary_device+0xcc/0xcc [ 1012.183847][ T27] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1012.189975][ T27] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1012.196256][ T27] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1012.202521][ T27] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1012.208709][ T27] watchdog+0xeb0/0xeb0 [ 1012.212893][ T27] kthread+0x3f6/0x4f0 [ 1012.216972][ T27] ? hungtask_pm_notify+0x50/0x50 [ 1012.222021][ T27] ? kthread_blkcg+0xd0/0xd0 [ 1012.226810][ T27] ret_from_fork+0x1f/0x30 [ 1012.231250][ T27] [ 1012.234653][ T27] Kernel Offset: disabled [ 1012.238981][ T27] Rebooting in 86400 seconds..