ffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) close(0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xde, 0x10}, 0x3c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r1}, 0x2c) perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x9, 0x8, 0x1, 0x0, 0x6, 0x868, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x8, 0x5, 0x2000000, 0x8, 0x401, 0x7, 0x4}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r2, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x18) 04:09:31 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:31 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) [ 560.986307][T22517] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 561.018578][T22537] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000001700)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000001780)="2b9119c34760bf2678f15c797a9ba0486772add101b45274792e01c1cb5f718c38b5823b7ea589580f0b6dd65f18ff46b1f758b6ce9374ab25166b42332f1dd6aebfa6e0267d883e5da691fd3787c92e193de263d15cf0efffcfdd4415932d510442ebf47b0ab06d314cc9363579bce81de015d825776be49cfffa86bc807d8265b7bbcae36b7a952b0883de704d94406fec58e193b740acd92d563674e75449c233bb14584288a49d7a1ed960bcc834b3ae76dda0b6e8ccdcdefd16b5574ced716c8cab68dd2bc22a0805cd4d84d94c90ba2be240f7646efaa88cf27d43c0c34bcc498b3afc043d3fc07acd6e7d3b04db7b0576", 0xf4}], 0x1, &(0x7f0000001880)=[{0x30, 0x88, 0x93, "49d7c844f8ceaf1cb7223765381fd38cd361bdffaee4457d9b"}, {0x100, 0x1, 0x9, "3b7433a30ad45fdd88f5a397117bd9dcd574653c004cacd418527201f33e4cdff6f363ee7006f23cfb6e28568fe98400af3acf2d7924d24f3214da73edafdaad3702eaf2d9f2cc0bb9dc77726e03d6172b5d801ab039b309e226d9f03755baeb6f0b1e9b30c6339cf347e4b20e7737a8ba222f8a7e25384b2f7e1cba2f334b3f45ce93badf13e76fda13c6a41ceb13c56755301b9a5e29c3d057b6a51ddb35df08e1e2bee51f70cfa60dee5fe94cb2a15fe17bc446aa1e11d3efb3791a23896218a75b07eb35f73df263ba723ebd888e6b47349df6808df3e4cc6e9f5a62bda4c154d94f5748df8463a06e"}], 0x130}, 0x1) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"/1133], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0x113, 0x0, &(0x7f0000000700)="c45c57ce395de5b2890f7d637a223920f181c2e57d71483cfb2d075a3fa67258e080a194805cdb0c26d3f7ffb1e0d9cf4fa36dcb2168b72de48ac8f93e6804f1c4d70898d0810e044d7e1778eaac5dfdcc9f1208905522025bcfdf1b6f969b094d5c022c2b7ffefde71e0627b9a2069cc1e0175c4b8860aad4b0a103c589f676b6c4e85eb3950c533b6e62c39ccf9ae9bfe54ee5887358d44f46337fbe090d7c7e55847edee8130ffd3d1e719e01a68b0e691c0d35b0b56e0b514036342fd56f08ac0083f3c2fe41a1295a3d23cf3d160d4fd90f66beba68860456ed41272e1e68d16c2564c85f5556e18784113c493d13253e14d6eb891707fba3c30d07d5ee8619e4426cafec4cf6a3723c455d09b586b248", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000002180)=r3, 0x4) sendmsg$sock(r0, &(0x7f0000000040)={&(0x7f0000000140)=@nfc_llcp={0x27, 0x1, 0x0, 0x7, 0x8, 0x22, "a5b09862a4c5d88995ff5c11885f13fc009419c55b5921f7c5113494ffbb2f575093b092945a65322b7e9a1d6872b939f0659f3f19f8d22429db9649130d11", 0x3a}, 0x80, &(0x7f0000001600)=[{&(0x7f00000001c0)="7f55b902ccede16370074c02b9e2fae0fda4665302fe1dbcdeccff14691255284f1158ae629f567e24399033c38ffbe209b668b74f32fbb24fbbbddaf372f10d3a9a3e33e002eb69e34a78fe7e1fca3356d7fd939bf23fb55ff977ee75808a420fbaae38589eb48018c93dd48b84599ff2c2745bc23385c86b4f7d951aaf6068f35a0c982b766705c81aedd5f79873e90f75ad72a294fd", 0x97}, {&(0x7f0000000280)="e311c86bf3f196060dc47994597ef1ed29212050afc448567c264d46f75e95db2e64c6aa7806e805171d065f7ca9d64df5e78b2a553ccf851743887cb507eda20644ca4784dcc28f0e6484ac0f20990e066dc0ef68d371659e151bf8cd0a9d71f275dfda139100422e08de52207e249fddbdc1076104ee326d4cb5e051a233092ee7ff5ca965b6cf1c5169eb0a51e720169cd91c5a8b1b108ebfde37821bb7f55cb1a83780b3d345f5bf7c327558be93974c86f9c39ea435bef83021", 0xbc}, {&(0x7f0000000340)="ee9af0c08af01da58629a891116900f1974428cb21a3b6b4ec7d481420864c36a24a2dd6448462f487587a50a1ec1edd7700f2cbcbbca96169572706cb2bc3159ddf4f30ecdf515e22910fe1fca553bdbbe58d1887ec91fbe6459720943df5ea15a4fa86048988db3dc8d9847444e4d26db38db582adad01df69c9c7aeb7cd23a60bc5334232f99fcaa18b4b9aa4171f9f07b4", 0x93}, {&(0x7f0000000480)="5ed108fefd0b15743e0c9dc07daf11a2d254704679483e89cf302c3159127ace9b1d33633a648302b8e1c964b5475706be1676918148b6746a678f6250dfc46dddf9b58a4ba8ba7ebae47c7a7bcf049bf4a9838247f9cf9c215ad0ee2ed5d11316fde75206cf64e1cd82a4086ec7719143f45d378be61185499edff153d3bb6aeec20bda2ba7aecd48ccf1abad3a2149f2c80c9adfe86a9eab85c7d60ebdd1278d195c3fa7ad4b533cd99b52f364bdd9f6439f9d3729f1350e0e8e9c5d6ffa1f35285bb52c0220b1044d34aa5a0da2cafb4caa1f9e36d41555be28e92f7ee0a47b4a50998b0d0a3db0345003cd3d15eba0", 0xf1}, {&(0x7f0000000580)="95402eb47fe7117b035da72b426e4c3c441f493642d403b1d01f71698765decc77916494652b36bfe1ce5ed6ea29d19693c0409c1eaa5e90f8048a80b7a03451699ae02cd906d6b1f0df9d93d6442eba1afdfebe620c6ed42d9764a12f6d08190ff7b8da17c8eae93a6a38d80c5a47999e3fc6d939934d", 0x77}, {&(0x7f0000000600)="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", 0x1000}], 0x6, &(0x7f0000001680)=[@txtime={{0x18}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x1}}], 0x78}, 0x40011) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r5 = perf_event_open(&(0x7f0000003340)={0x2, 0x70, 0x5, 0x40, 0x1, 0x4, 0x0, 0x32e, 0x1000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000003300), 0x1}, 0x42000, 0xd5, 0x8, 0x1, 0x3, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f00000033c0)={0x2, 0x0, [0x0, 0x0]}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r4, 0x800454dd, &(0x7f0000000200)={0x0, 0x0}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000032c0)={&(0x7f00000020c0)=@nfc={0x27, 0x1, 0x2, 0x6}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000002140)="c3dc044452c2d54d1ca6fb8b3753cd43be2a5df8b5d5229592855d69f3f1d3e7d84ffc9ebc27af41749283ad7e0b33b4953fb41daf33fd4aafe3", 0x3a}], 0x1, &(0x7f00000021c0)=[{0x1010, 0x3a, 0x7, "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"}, {0xc0, 0x1, 0x7ff, "59312f216e9106e61b7dc913c9ae3dc4a09e4a865273fd2bc90058e613868b4315871eb13477acae02ec4b068dd1a357d9c8485ebe788a6149ef1cd0c54f9e85b631f8dad6dfca494f1e0fad3f245d154fc887c73ee21af4af8bdcd53b85e8aa48b666a26308ded932eac244cfffdf88ca46ebecae6a4d9a5bfcb8276eb7747677dfa5791de931da11d852f756752aa1f045fb9447520c39d7acc6287a528cd1cf3768cf0d1505d2bb9f3d"}], 0x10d0}, 0x40) r6 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r6, &(0x7f0000002080)={&(0x7f0000001a00)=@vsock={0x28, 0x0, 0x2711, @host}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001a80)="9a7e9832cb540782a5c8bb9b382f534eae28ba448b54eb116fc78223f1452b3c8254f5aefe3f2b5ed13b98bd7866ec99b7cc0f66ffda93dfec846de35a9930ef873907d5c9e344c0ca198ceb694cf6ac6dc7bea7f4da5f3330b428d94ddcb0c17308961daa2eb3dbacaa8d6b62f5a3904317aaf3c13863ecfd2d03ac25484be935e776c05087459fad3a5de98f6da033fcb1f5adf49a081e3dc2e4397127187dbff08335d017981a0daf8a13458cebc83f25c9cfaec99d1e96c68ce9f8f8809474254236f30108fcc6e7608fe9d59caa512fba44c4b75acc8b74f9edcc", 0xdd}, {&(0x7f0000001b80)="a7a2e2bd3de15d39557c2547319e8d6b231d4fc2941538eb26518484d6596a8f501cc8a63a7b57504afb28f3ad40eaae7b33d3f4b77d149ddfd0d75d6678b0df6c555269fd703f6c7e0c224c4d47a5b8af1ab3870182228f01e5388f9f814c6a1358299fbb4ac121af0ebbd3764f5adfc8776d900c2019004780837cdd799ee78439747c9d4a06baf5e6d19f82f90d15d6b5ea9631b61a725136c0cec0969368511497ecbbf61d5799b310f2c3287216bf2605539279e84d29bfd242b87862cd9cf4c706c801e44974018a28a4814358497e6c979b8195a9468440759ec60db5b1bb11ca2ea5cbda5e2c39bfea3ad11fc5bbd9", 0xf3}, {&(0x7f0000001c80)="2e59b0256cda1667dcd29fcfe874c32e520caee389d0503a783c2b14b32c680a1edfdf244ad59a08de7cc84533804c42e658444bf9c99ac25b2f2b439a3672", 0x3f}, {&(0x7f0000001cc0)="799ab1", 0x3}, {&(0x7f0000001d00)="fe6c5ba9644525de65c0d34ad73573710bd6e1ae34b9be3a07f2ccbd604c09f02337a6cf5522b7dbf232999de7468825152a564809b723a2e440bae2da0fdbf8f5239b63b09ce35ace41ba8c0cd767eee86669a82bbaa8dacd5aafa3e410cbe1cb48ae932e5182ca6ee782b8369b629f8218d6356f311cab7d575f6f7cf33784f28ca3ab8f524a3ee6af0bd1b4aca2eca917f57541a3b78974ecdf91acb9db802dede6b4e1613b2cc4ac543a4679d98bc33bb85ee0591617dbb2501e7cc1048ae70c7cae4b4664313cdf4f5e", 0xcc}], 0x5, &(0x7f0000001e80)=[{0x100, 0x3a, 0x0, "428fe3b3a0686b4827c73f5a4018304943a8aed21473b89fa508b13d2c00e0b60b9a7b3ffad19789438fbb2c6fd31caff4bebe5f699db35872664800d045895eb5923096a44df964b379c46c729b1b745c6ef20592eb965b4755f591ea37efc718831d22be9ff3b566471fee44337af22f3be2d6874fc5a771566e586719f8f8ae1291e9724f18ce55bbbc11282ae7474b67d1ef3257709a7b63611a2fd3a55970cdbb47d51caf0a967000d42b7bdecc2c661a42f3439163ba04113b9b72643e2e2f8e4e912541d32e516af1dfedbd4369d2b1312fb3e89604a3d14b1218569f15e31408060f6df41450504a9c"}, {0x88, 0xd588ea868f5ddcab, 0x7, "a0a7328202dec04c7f669f21a1d280450340937fde0910718962441a0b5821acc491a633d7f5c1adda90c8e92471da816e51601a7c6cd1ccba1437d43a2935a3b64eff687f2baf0176601a2a9876d07986f7424ebcc3fe97960c991c01e6dfc5368fc82df1d47cbafa5380b8c79f9ac912248d8975dd2c"}, {0x68, 0xff, 0xf7e1, "61a2f87e6cc9ed26bd544d31021abab37e457fb8cbf8eac75ce45befaf03f076cf6332da1309c71ef8227ba8404ab983d20ac5d7f20db501d0fa32da61de7ab8f8cd5f1f860f402a1dec38b5fe1eb4ad1ef641a6f9ba"}], 0x1f0}, 0x800) 04:09:32 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:32 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x20, 0x1, 0x2, 0x2, 0x0, 0x1, 0x8010, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0x80000000, 0x3}, 0x10800, 0x80000000, 0x80000001, 0x1, 0x4, 0x7}, r2, 0xffffffffffffffff, r0, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0xde, 0x10}, 0x3c) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r3}, 0x2c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0xa73ec) perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x70, 0xfe, 0x6, 0x4, 0x0, 0x0, 0x3, 0x80008, 0xb, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x7fff}, 0x2, 0x6, 0x8, 0x2, 0x2, 0x0, 0x2}, r5, 0xd, 0xffffffffffffffff, 0x8) r6 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r6, 0x12) r7 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r7, 0x12) r8 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x1, 0x8, 0x7, 0x2, 0x0, 0x6, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7ff, 0x4, @perf_config_ext={0x438c9ea8, 0x5}, 0x10f, 0x3, 0x4, 0x7, 0xc239, 0x1, 0x3}, r7, 0xffffffffffffffff, r1, 0x1) r9 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r9, 0x12) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r10, &(0x7f0000000200), 0xa73ec) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r9, r10, 0x0, 0xe, &(0x7f0000000340)='memory.events\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r6, r8, 0x0, 0x19, &(0x7f0000000000)='%$ppp0keyringsecurityM{{\x00', r11}, 0x30) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r4, &(0x7f00000001c0), &(0x7f0000000100)=""/108}, 0x18) 04:09:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\x10\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\x13\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:32 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:09:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcc000, 0x1}, 0x4002}, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:32 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:09:33 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:33 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\x14\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xbc3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r5, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, &(0x7f0000001600)={0x10202, 0x2000006}, 0x0, 0x0, &(0x7f0000001640)={0xffffffff, 0x0, 0x30, 0x4}, &(0x7f0000001880)=0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=0x5}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0xa73ec) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xf8, 0x5, 0x6, 0x4, 0x0, 0x0, 0x40000, 0xf, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x1242, 0x8, 0x1, 0x9, 0x3ff, 0x887, 0x7}, r2, 0x5, r6, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='wls\x00\x00\x00\x00\x00\x00', r5}, 0x10) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000007680)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)={[{0x2d, 'cpu'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2d, 'pids'}]}, 0x19) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x80) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r7, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:09:34 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:34 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:34 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:34 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\x15\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 564.019688][T22612] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x84) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8901, &(0x7f0000000000)) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) sendmsg(r2, &(0x7f0000000340)={&(0x7f0000000140)=@isdn={0x22, 0x1, 0x8, 0x1, 0x6}, 0x80, &(0x7f0000000300)=[{&(0x7f00000001c0)="e89d8c18cc2cfbf832530527ad1ea5da09c8117ad9e5fe151873f2ffaa507e941726475dba5ddd2f9704763b06a16de019913fdf6a718886e837371ca8c88eeab049ae27db0007b4621bd34b5f5aca108d528c819cd81af9dd1bc575ed8f4d7bacba3d1a1a10d6aa869ef54de437518a13d4c74a9576adde9873e8eb59ec69e988737252144a1a790846b6d2b7012a22ccaa9193210d70b24ff522667dda3c70391cc6f4f1cf646df5d3ddf8ef4a37144093ef563028e9596485c8f57df1ad22961e791a240fa7247be1ac7b7c7a2171f12968d3a021c39606da39d561f3af7a0d", 0xe1}, {&(0x7f00000000c0)="3b2609305cff8d92", 0x8}, {&(0x7f00000002c0)="389a72e2b79e43c19fea203c9e70a87bab80e6", 0x13}], 0x3, &(0x7f0000000480)=[{0xd8, 0x10b, 0x4, "836c82b0478cf159438a15c3f02d1882277a2926c435dc780b0cf8ba60382712a3c2827a266354adb30654fac7fdbe9b22083f5bce83c0541eef261d0624db1a5d8943b6d194c3112af6e29dff0ca6d84733e7f209c3bfc449fe503a19d8890272bfc6b1556852223c4f7b7e2c4a5b6fe6df60da36fd8b15a0627b4a5a40aa97abf85d5e8203a1f50da87e26d18025078320b409009baa215cd457cc2c81c5aaec8e14ec3432ad3e285f84462634ce14b58250184ecc9e21d641571d2da6dc6519b1ec3d5007887a"}, {0xb8, 0x387, 0x10001, "36939b779111fb5efbe5aba39b65a08d2986b5109c2aaca1cb150f6a631042d0aecf2e019f47ddec77bac06b2a0fd6ef8bba0d1d96323646ace740e8875e93ecd63d99201b0abf6490b5503f5da663b6a6b822fa15ae6815883f2d7d3e3010779cb197248abec272c92d10dc60cd88eabc03fa165c82fd8fbb437dfb094a1db180e10f4561ccefc1d4ddbcf04fe569561e1a9807236cb24682ba40c5b784ceb83b89781e3f44a886"}, {0xb8, 0x107, 0xfff, "853a820a5657297bca862c4b3595d5ad35a6d9b5a4ff779accb9bbce4156a6cb2e06450958c5c754d22a5d8658288a4a9badc4797cba4a2943761a10c5ed8c233e529b21028305643332315a0c63897d529318bf0ed324c3c710ff421870af626c83e05fcbf0b8889c8ab0d7a26a1aa466cc5395fb309bd85fe102f0f245eda71bc3568411f39c6ce7a68af8607ce475f03654f9dcb2c179bde9524366e3237e285731c995ecb5"}, {0x108, 0x1, 0xfff, "29b573606a1caed98b221d972f37bdbaf5adbd2a421ba57e506e2985ab5de87356d3465941eb36629fd8fb0b350997a867cde1d57751880d7cfae19d122d87c05ff9880f3a8db44369da43c9d3ecc305fca50024f59fbcce3d2c1e8baa7819fd94354c3ac67ad72c0492697cc8b7f8659dffa24fb2b3a443be40001c582197596845a74145801c85cd6d388864809938da1adf3594838321b1bbbe4beba541f3902eab022c36b35839de2c17937eed3e3a1ce32af0ef49d6a92ea7849c969e311f882a75feaed159c58c24ba32f3326a746c3c88b90506bd6709a4312af8224cd143bf54179c179021d74c3b55804092d8"}, {0xa0, 0x103, 0x8f2, "24b52cae4090514473e4d3fda550c62f5e55bd3fc5ddc47a5e7e885a511e367614aa31b06d295452f294090b7b461cde932e203e132ee1a07f2339dd721b2740c9fc381d1d21331db43fb3341cdbb2c1959d489f26054d6b9d2cdf1b72675491af36cf2ab5dd84c328a68b402734e72d75a9b9d7b34743109889ace6a1aede94a6ba3a7bbb939f971dfa61d9d80740"}], 0x3f0}, 0x9) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x4000840) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x1007, 0x9}, 0x3c) r5 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x1, 0x0, r4}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) close(r4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r5, &(0x7f0000000040)}, 0x10) openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) openat$cgroup_ro(r3, &(0x7f0000000380)='memory.swap.current\x00', 0x0, 0x0) 04:09:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) sendmsg(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)="1cb9d63d126507c6072dc771f5265d5b5771f5fbbcd705012a0d3d050f8b1ca7a1e12d5811c0cea5a21cc2987380d0ed1aaacdf8f192ccc28390a7c70ab7f955bf37d32587c14233c63faad17030a0a6ce355197eaeb0aefd6c23a2d5df43e336cf47bab450c317c0e35c27eab9a6e8bbc1a00b5c1b8a865eec20723f5c56d2cbf8b5a791296dc011e7fec9c15e8c6d0acb88974991115a860", 0x99}, {&(0x7f0000000000)="b03e0cdc81146b8034858df07f2d8bc354d9d5f34ac79bab17b223030ef41dd6294785199b3cbefa620f37d78e6f6588af", 0x31}, {&(0x7f0000000300)="0bc6d8356b1a8fa2124c50ae83c89f0a8a3d932df98e0e2bb7f7a8277b9e9b9ece57eb7df180a06df436b88d2a085da359be4f1040606b27c023145a71978b5c968bcf2e912d865acee679deb11f6ea4163a0123265d162cdb03012324bcc6c756ce9fde7d6fe1b2b45fd3f2599b8aea8ec5d13b22f2a66cac113187e2b65b5103cf5acde954fb576aa417c7432b0928d4c5be9f923b87e7ee43689be77ef2be3d63598c403c5c7a5c6e4b9d9fe1e6ff9882f00374e01d7533d5dfa835b2805c0cb2f282fd0db9e093902ed8aaedc453e95c44c74c20dae36c", 0xd9}, {&(0x7f0000000400)="fe9d1b2bd8da25fb3e8eff853b824bc01fb51fb3da5e1a40524fa4d4c9079d8cbdb001e40e5e5dbd3bc09c73c8a6d2772f93870b66cb34c1e749a3844419793bc0713e91e69e44af2799f3ddca00cf84fc7a6bbc969e0fe3f87baf86bb66d6eb6207f9d592fd089d", 0x68}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000000580)="81fe2aa9013ac0a875137b4f20ba67f1c5bb005be15ef168529883dcbf6c39219e38a2fe3a056dca796c05c305dc2e2738b9f1aafb907fe6bcb3116754454c0193c45ccee7423ea196", 0x49}, {&(0x7f0000000600)="c0650781f3a12301bb5d70719f3d1547026e5be6732793bc5bf74c061e87f32cc8128719e6433c2dd75558ce260f3a753890c0f52f49a396fd2d0048781233e4b2517d2b52979093ea9c1c0706", 0x4d}, {&(0x7f0000000680)="153baeef237011c73554ea61b7be486a54a7c4406ab25e0cec7a26a355e5fc7ad2cb7aaf63b1687e167209aa399af32b595c8803c324ceb60fdf51b694c0bd572c850a0320440b8d8e63a887a203f270f0f693942a0e8ac0f31ed92781b0a0f22da65c1d90aaddfba4c17a76ec60e87a44ddb463acb0957cc8e64fc626068d9aff31f3", 0x83}, {&(0x7f0000000740)="b461f2423adde16b97f1682c6c340c9356c64adc1daa37bf3cc87d17cb92d434090bac6f7eacaf578c65a143085f7b5167a3f439ba942744faec31708941a2d58d3e75c741049845179248130a2d8a28da98ffb4535119d318cb16a9f820d990e3656fe0795ce08487b274f771dfac75fa569dd9705946a32e5a3220ba9c4b4aaab669add279937b113ebf6b5b287818b6ec604b79c38ddd4d485e73c6f6427db2471464b2ce7718825794", 0xab}], 0x9, &(0x7f0000001980)=[{0x1010, 0x0, 0xbfc, "6c91e2a591b6d650a7ef3a7aa779a993cd323d119087c25a82413a2c8e248970b0c8727c540beddc3e82a644b23a03488dbee4aa83e60ad06f81c5920d0cc6147b1278a523e9b519ab7ed05668d8d4db1a955ac19001095d30c945af9eca70504a507ef4b44a7dcb28812fbe73ea27e1527f39e5096e4262425a818250890a1c12562c8d8a5ea5fb69ddb5e230a7a3941ba699624ffda3316f9d6630949d1b22d6ff8135a9662d26149d6c7fcdbe1e971da745d131daca3bdef6efc63610f2ebdbf7c0f904a30843e198db7b07df6af0eec03aa2ad3e6e4c6613da1f72b6a8c314ac1b52cf500bd412e3ad52984b810a165ae58cac397eaa899c6c32d9ddb18dbbe855f268e100f0cde8f3e3488bb4ef6bbd0f0ef82947693a430c428116592da808e12c3401988a90d72c9be44c6df3c4578cb2e60669f9c9b9a84a9a98367e1b5839930e344e88e6e28b70cca700f26dd89b7b6948b86c288bd086eb29962b089fa05ee1d50d97ec9371cd52a2bde14141e3121fc3d53ebe475a5740238b1a0ff9db5675b34c3e0604d4f76eb1728561f00b8f3a3af321c3502c7b0936343e934c9a3150fab20423b2d7441100340c8a036bb6423cbcf371f1bb16b78dfae7143573d8a565e4d5e74d749b768d9d588c1fff1f74550bac381a526fa34bd957225f497b4583ccacc12e55deb7b7cd3b0c27b749dcf82ba4d4c737ff6b6c634c20c05306653d1de41a6915c9135d656302b259349ededb568da7594d2aecb90e218c77ac5942d4fdd3e81586d5fd2897ec14640aa44db885eadc51ef29c19ab551381e83f563b8b00d2d6b76c1b21b8e121791d1f168040a7c81b203f1d7606c84507d2d323f985f5b6205770094bc635e45b131e5a43090d926c0fff1db126da9b3bd371d0c9f14c0658b0d91436b18d9f3a35f3c8084bcc0cc96e20435c5ee98d9962f78ef539fa094a79554dd124fd4ee0e2a325a58e2ce6961760e82507f5d08f72001c008e575a1b02f01de6e4c664d1a7c46e8c8262f69d0c52580aab0afb8ac897e1950748aedfc831746dff4fdbbc19879e8b53b4a285ee97cd3daa43a8e5d60af091f4042404605bd8a0381f4669184e03078fbda09304cda0549415ac2ac5ed7a721bdef6822602c95dda8ce5b2e25eac78e3a11ae08883c7dc13c440866345bb022ca68982ee93aaaccb00f37c4cbbd730e414c7a6045547340d6766809fab3f259d2f26f65fa8fa5c6cb29935e765679a9d3a268a4868d59c1656b4072e5327e2ec06705c2a54c5eced7c53666a33e870568cd69b026a6c7c186711287b2948b086a9f4b3c638a052733c63355ff77305c7b2a701b92bfea091aef744cf00040f244763f36b319cc6491c0411b16e3d7fec62ccff8f0528cf87d4642a490309326ce2b04613f7698060ba0ba47e6c4723b14c4b76906b94c85734198ec12922bedd9ed216d70eab0e064a7a5459f9c6bfd9031fe57fd92b87118b6673e36eac40560494fa5a6d9775ed5605ae220b3e3545ad842d8c6ac06ecff0818d773a9b6735069668dc0400ab8ce64fb51422c8654f691a09799559ef6ed70633d2a08da5829aa624373a2b9d74289cf9ca8d88e48e7794cbd8fe749b4e857a13fb7b92a777dbcb8ee7a84b6f1ae79cf4a1733ea03199cb8f4eb67e614200fe4ba5b07f638139639e072d9c255d49e03e4781b999584eb514f2d3aea71ab834460873f0f8fb7de2fe71b277b4d675fa0a6329430d0cb6b363f288f2c3a0d457e79382282ebbf2cb8dd8934bea4d171e9a1e010b44fe79bc1e666743c869ee537eac0d61711dba96c4cbee3cb9b59614fc31f6cea0dbb424f987bf33a303d6c9fc5475fa5507232e12d58db0105d766d1e4841eb2eb35c91915ca2783270d8e0de460390458de48d5c5ef0d8bfbeabac9b1515c5ef2be79c74f09931aaef35cc15b004c4bc69637d8a55423591feb5301e81d5a81d63332dbae1d79ebfa3204352d7450fa4c384f9bace924c4f1834486c62a7e4865882bc4402bf745f235b6df03a5c755b56cb1cba12f9533972458d4af77cf1637858df67e34e51998cc3ca8fd976a746b88f4504cdfd301b69b3fe1bbb701e9e3322083b67475e9e0b9a7d186d8b0c2f037d12ddb8b875e03ff44ab22b7c028ebb928dcde8451f64416e4f99c356c191eee33d725716b9c704dd13a3661f132933b4bc4fe0ba9ece68bcdae3fc35f5f2f84fb7903b14857ccf17e87b5a91e5d6c7c422ad27fe4d47f4b190a6114184581163a2b598c622d8fc8c8d6f4a8d275191d95b1db7f3c92fe3c82a7dc437d4a37e0dfe6373aba747e5598a261f86b49dcf7958ed5370d9472d6539138d2e260e12083d7828895d7c15b8ce755e157a455247a286158ef10c3f99b1bfa6fe1f299ceeeb9858135b01357310822302b1b4b470c4864f7ce8c20078796feb852273fe2e7d06a21edbd5c229bd950d626b35be4d4b1e0332887e90d3c7f9975e178679fea0ffd3a2b66975a89f2e8b9c3b4dc8defc51942729b7e13e3ff0629adf83b81f2084fb746a7cae319c872b7ce019e0a4082055f5bdd48f39132c1767180ea726b32e02587f654452c73e1d4f32f2a9aba3ba293dd8265116ff7c0d82c0a1d983520b4063e89a6f035bbeb72c9682c1cd82191cdc8e9cb74ffb296cac0e451c289e270be4bd8eb608c46c7482e8b067a3078612a74eab1eaf55ee9c09ebcbc0ed9c2e7b038126cd8a837165685cd95ab3998a2a90cbce54f6871478fe6af829df93f186fe4eafa7ec34c6d57ced3b012963ec2199be4a370198d086f7bf2b2821fb19d8851ee7873096fb35939285b72be96eee40ce8ef6057c94da1d172ebab80819b05f71a0a2d9303aa17bd470093642b3af5801d9c4e3a8d97b00f79208d5891f5af7609c0d7e89377d540e57dc878703d35d1df73078b175fdc2b398a925b8c61d861117888d54de9c36054b30bf522a7560e68b0fb17b24c9297e466fbc896c62af1e182a9bc91af800118c3457513a406fc839f8ae9d1f1578be8575ff4fd92fd6a39369daf361487fd541f9c8787ee19ab3163b90fcc0926a85e0f01f43429aa8241db3072aa08081e0a39fe38ac42cb85b75d86e20a4b2e9b06e3cfd6922404d79c84ad265c1a1a05ffcc184fd4bf5401e3277d269f90eaa106b390f8ce787c8d193a3c127a8674b857ea4711f4e8ab1dc3c4cb04424296b91b49de4a401f83bcce447c47adaaa545269666d3e2da8b15bb14a6498e728b0a5615ee4ceaac70a69375ce575cbdc3cc5ac02cd6bd88c33b9611476de74bc9fd80c86599e2912bf22d010fe0dced8590871e5f443bc08a5f4a1fb5076fc2ca3bc7f49d1af35dd2bca6c239ee006c1046737256c1e1d939c670f566a9c2bb5c793d99b64ec4cbeaaec766b9525b88c05929f297e2f95deddab32dc7cf71ac8508e8c68bcf68ad7610ff778f2cf0a0fd56d3f8c93c97c7072ce7524a28328334123ba26e1eedb380552ba89341ce7c1596c823bcf16860ededa3118460bd27dafe56c256fbbf920a2cec44b3c3ede8bf75a780e3085af9ed673e042f9bfc3a24317566c30af8a521bd899b6c021a98c7634fc78277ecea2b40a11eacee8f3c9055c8c38fa6eb51be75103ad7f3b6e5405fbb68ac2d0e0347544a038e5c60cc39b57edde0de7445dab1b3091bb7214085f258f286fb88c69e13e28e58d82e7dbef77c329ee0df40b7a46a78b3b8b2877f123b5a59c955e8ddf059f5fcc785b07b896601cbe7b7904f428647ddf92097fb42f60612278bf99cc922cef1d0b138b3fae4bc4e2343d1beff523b0215b9340cdabbf3bcad77bebcdec0fb8f42798337e2bdcfc16003c1b8e8ae900fdcd7b3854cd5811882c3f4b003f5b59264332508fded2717b98365cb262341c0ba7445252f1ef249dde9d83e3c8fa5537fcd14901d84a9751732047b2e426e76daa304592e6a749e704cc42ad91b107e764e4934ce471e9d159bf1c1c7c54f440908aa419022e11264653f52a29d8e607783a18647134b617aa68b90618e861608e2d48490a0c6efd5c71f639d767e0e5df9b7f9a13b373cc61a0b826c575ed60583d3c2e48ee20680bb6b5673b810c2412a3d91d6272aa74376c58f7165284d5984497dd64a93d888707bcce654cdb4c545e9947b0b5b9ff5b9b7eccaca31afcdbd37c93b18430189e3ce31081e074372d7836fd4cf590eb00b497a63a1fae98faf89c9aa551390a23a3c8828dd1539d297342cc2e68bd0dd4eada27769ae07eeecf37e32ef85091116703f7e53eb113267f94d0df6a9c2b18a5fe93db31fd24420cb6b64164ee60cdf393162818d97a95ed71695d1d9928c23cd195681ae514cf363dffcf10310057688de65d849af0131e3a8985278dcd2f7706c3fe651524e6043162ec8f654bb7393f2cf66be2212430705faf663d1e77ae9ddec39e38128f6c01b4868beae28b0464c248b044c654214288ba81d88f1d27ae067ad900478266b9c4c3fd458b647bd1ad975f484ad25bdfffbb42a724cce4a2d7fef6f85d505cbdced6d915727bc57cace58230add4a7c2e456db724e1ca9b729b81d1c0f5f95796ab2f28236398e83ad4589ec16f402a1230ac20fb48338a7f0e6fbb0e5a69927722c8f8b25cd6eb77c4465b7eb926a0ed62ee3da84de3d47092ba5600ca6673d40901b357396f473ea93842624bc857ae2833d7aee9ce9722dff390696e5ce323ec17ea5b5680d3d00f0b13138472fb60cd2309bd936b41ae02a6990323465612c78a9b56c5aa35acfbe43ad01f63f1619ad83d0e87bfeec2353edd98c5169c36706e95d41daba5c2f9fcb85acf712a8f636706d4491a720d1173cf0e550f84a44a6cba81ee31241c7ef50e088719adb2af98a04efe41d81fa95f8bfc6681aa4e9fc2a3ff3a6c32e7a3fefdcd7e8dff6c1824aa5872333ec4222c2e298eb00d61bc287338df4c210f2bac4312ea328a2dbed5d66c9929275aa0fca6f846b9bd015cc484a96bc3ff70d3dc24805444fe0e827e68ed6c13c2b542f6f5293cf0efdb05a6f0c78c1b14dd8e9afdc8d84ed648a3630f636283eaaadfa422d212d49102033bc47ae92656bffff52d6201a288a50a78e7c7a904224b3abd13010078f12d50522d1bd404aac002eeb7cb6a1d946309704d4de02594725f1bb67ff1ebce5577e8be4aeec1f05043c2d587f69d2d3108490122f8eac5fb43a84e054d3251268167770c4bd2f8d8e65a22d03f38b81cf7c3488c795e9d6303cf475d68cb30db7aa6ed5bc19133a78667829e3f6e87a54503948b79234a1f21868026c33fa847d5d7d2d309b87f634f2779946ba2d99909dab0650a592d88bdbcb0bc3956cfd76d922e8db4574301cf9480531d04b8b9b58736d178b6f07f604361fa861f20ec7c14d68fa9c3de900d6600d373b81f3549bccad192288eb05e605af2c12fe48177cc8673fc4bbdbe037d6691133de7c1ae24370cad73a6642fbb0387cc9419ab6d022b449e947be791953bcd28a165541c8efb7bfea8743c7a58ef8231def19d65bcc786bc28633daba27e02474899f6884f97a81885e3d043d42c43e3d9c11948f2a557a3cbbbd40756bbd37749931f4a8b240a778d80fb7f7f5e4617954b80a793190e37ae0b99483da067c0592ccbb3b8b5751baf5368e663ff47b5dca4f813dbd7b1371fe5431bd9e14f98edce0bafdbab1ced7cc690d61f35cea4f0472405c45c9f962f75ab7eccc438d6e6087f700de02cce8c76ed615b91e7d4c853587c5986703eaa9e947e5e10df"}, {0x18, 0x100, 0x59, "bd"}, {0x30, 0x10e, 0x600000, "b438b95da27245254c5da2574e381f9c24a55ebba975ad4bd03e448632ce"}, {0x1010, 0x110, 0x59b, "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"}, {0x58, 0x108, 0x8, "3ed74815ce78111f2444966c0cace0dc20d4e441a15bc36e88655ace68d1fa8dce9d6c599a56188495c2a6ad0b7bbf81430f89e0eadad64f21c3f88d01899265a3c0c8"}, {0xf0, 0x115, 0x6, "165efc434490b63f547a2ba5205a90a9b16d3479849801429667d72d60d453562fabec8f9a4c5555932b62abafcb98a1b30b9dec1181ee7be8a7cc230b851bd45e29954c70903367672245d512db63b801eee7f146df17227c4d17c511d4f52c7ae4268a73abe4d5b482858480bde83beb624c301568a2001f81dddd644142644ac2515463c3ea3dc789bb384fea8c2f49fbd7de76c9fb870a788f0e2aba719173403b7af089926e9abca04b580593f4aa3e1f740e4871c730d8e955c66d7519a17167ccb13fbf8726d97271b423c197d17581168f53b3d2535e466a471641"}, {0x88, 0x10d, 0xd38, "bfc74c4df6eb1030ca3f4dadcff4580e54e11b6c1a77ca86876b2a73edb9520027fbb3086bd8b9caf0571ec7476e2288426958feeaa2a56f873ec17e023d7d766ff376b877c5b65ea820d49dd5ec6a384867b137e2c88012802f66301018031c51030e2aa5d6d3a8ffa9b4ce539f8236f0b5aac533839e"}, {0x10, 0x114, 0x59}], 0x2248}, 0x200000c1) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r6, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:35 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:35 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xbc3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r5, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, &(0x7f0000001600)={0x10202, 0x2000006}, 0x0, 0x0, &(0x7f0000001640)={0xffffffff, 0x0, 0x30, 0x4}, &(0x7f0000001880)=0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=0x5}}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000200), 0xa73ec) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xf8, 0x5, 0x6, 0x4, 0x0, 0x0, 0x40000, 0xf, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000280), 0x2}, 0x1242, 0x8, 0x1, 0x9, 0x3ff, 0x887, 0x7}, r2, 0x5, r6, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='wls\x00\x00\x00\x00\x00\x00', r5}, 0x10) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000007680)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)={[{0x2d, 'cpu'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2d, 'pids'}]}, 0x19) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x80) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r7, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200b6a8ec2f000000000077c853f2ad"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r2, 0xd, r3, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000480)={&(0x7f0000000340)="5a541d25f9bb4240536c7adc0625a89db791f4a3e1b4868f10ba8396b91f363b23463e7be313addb75495fd12f1be8f6cf49eed8049a57b7ec33d7dc43f5cb32b0428c4899d95a62d56af34557c0722c053673abb0e96037825fdbe59036abb5", &(0x7f00000003c0)=""/95, &(0x7f0000000980)="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", &(0x7f0000000440)="007e6db9d4104d928bd1ea93867dd2119ed8686473d5aa5e1ee5bdd929", 0x2, r3, 0x4}, 0x38) r4 = getpid() r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r5, 0xd, r6, 0x0) openat$cgroup_ro(r6, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r4, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0x0, 0x4, 0x5, 0x0, 0x9, 0x4000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0xd}, 0x400, 0x2, 0x8, 0x0, 0xebb, 0x7f, 0x800}, 0x0, 0xd, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x2, 0x8, 0xc0, 0x1, 0x0, 0xc7b, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext={0x47, 0xf3}, 0x4c800, 0x3, 0x8, 0x6, 0x0, 0x10000, 0x6}, 0xffffffffffffffff, 0x9, r8, 0x3) write$cgroup_int(r7, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r7, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000580)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000600)=""/111, 0x6f}, {&(0x7f0000001980)=""/86, 0x56}, {&(0x7f0000000700)=""/192, 0xc0}, {&(0x7f00000007c0)}, {&(0x7f0000000800)=""/45, 0x2d}], 0x5}, 0x2040) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r10, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, &(0x7f0000001600)={0x10202, 0x2000006}, 0x0, 0x0, &(0x7f0000001640)={0x0, 0x0, 0x30, 0x4}, &(0x7f0000001880)=0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=0x5}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='wls\x00\x00\x00\x00\x00\x00', r10}, 0x10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFINDEX(r11, 0x400454da, &(0x7f0000007680)=r9) bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x4, 0x1, 0x400, 0x7, 0x8, r0, 0x4, [], r9, r10, 0x3, 0x3, 0x2}, 0x40) [ 565.449952][T22622] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 565.483269][T22623] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\x16\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x2, 0x3, 0x84) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x8903, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0x0, 0x0}, 0x10) r3 = getpid() r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r4, 0xd, r5, 0x0) r6 = openat$cgroup_ro(r5, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r3, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r7, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r8 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r8, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x89e2, &(0x7f0000000240)={r6}) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x84, 0x94, 0x4, 0x1f, 0x0, 0x8, 0x10888, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xd88, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x8800, 0x511, 0x10001, 0x1, 0x8, 0x5, 0x2}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 04:09:36 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\x18\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:36 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) [ 565.888318][T22664] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 565.974600][T22664] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) socket$kcm(0x29, 0x7, 0x0) r1 = socket$kcm(0x2b, 0x0, 0x0) recvmsg(r1, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x2, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], 0x0, 0x6, 0x0, 0x0, 0x41000, 0x0, [], r2, 0x14, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) write$cgroup_int(r5, &(0x7f0000000200)=0x7fffffffffffffe, 0x12) openat$cgroup_ro(r5, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r6, 0x800454dd, &(0x7f0000000200)={0x0, 0x0}) ioctl$TUNSETPERSIST(r6, 0x400454cb, 0x1) 04:09:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:37 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\x1b\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:37 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:37 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r1, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, &(0x7f0000001600)={0x10202, 0x2000006}, 0x0, 0x0, &(0x7f0000001640)={0x0, 0x0, 0x30, 0x4}, &(0x7f0000001880)=0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=0x5}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='wls\x00\x00\x00\x00\x00\x00', r1}, 0x10) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000007680)) openat$cgroup_int(r1, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0x0, 0x0}, 0x10) r3 = getpid() r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r4, 0xd, r5, 0x0) openat$cgroup_ro(r5, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r3, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r6, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 567.353670][T22677] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 567.385126][T22695] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:38 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r11, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r10, 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r12, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\x1e\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:38 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:39 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r11, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r10, 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r12, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x1, 0x1000, &(0x7f0000000980)=""/4105, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd0b, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0x0, 0x0}, 0x10) r3 = getpid() r4 = getpid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r4, 0xd, r5, 0x0) openat$cgroup_ro(r5, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r3, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) unlink(&(0x7f0000000340)='./file0\x00') r6 = gettid() write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r6, 0x12) r7 = perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x50, 0x1f, 0x3f, 0x40, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x10124, 0xffff, 0x8, 0x8, 0x3, 0x3, 0x6}, r6, 0xb, r1, 0xa) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x63, 0x8, 0x6, 0x9, 0x0, 0x80000001, 0x220a, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x6, 0x9}, 0x2, 0x7fffffff, 0xff, 0x5, 0x0, 0xe7df, 0x8000}, 0x0, 0xffffffffffffffff, r7, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r8, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}, {&(0x7f0000000000)="62e99f18a0fa6a9f9944af6fe8aacf2ca773ab91d9dd6e171d6555889abbf295bae7a2d4f8d93f4ec73a5841766aa4f52abd24140d8dd45b3c119a6e45e2ca15d1874ded4d84ae271e432dedea9ec45db4be7a0b39ecf93aa2a4e438d584dbe337db179ba34cf5716345755881dc45325cbd18d5356fa0f13d53e8fe708f", 0x7e}, {&(0x7f0000000140)="291f83af3c238567200aa69c686e57eba0982ee053577cf5e2a9056cd3e5e949e4547e255c9257880fa4f90250d302517d5b619db3f3fbbed418a70cda077f100c00642d921ae05a8cad5a60038834da8d2a54d218a9c850577bff3a0ed7bde3a3b63abf4efca963117e118828c66ff1d9f21eb109", 0x75}, {&(0x7f00000001c0)="0be7ee531fb7764c961f88e9fca51420766a8db6b64eb2054751067a0067d6345a18cfc7a15aaf2b5c31b203fc5aaa03ce995f4d839288deedf35e2c2b59126d4eb654d13b1a5e90b27ed9e059383421c068387644ae190db159cf18c64e0ec5aba86ed0c0fbad93f6c4cd3dcfba650eb552e7", 0x73}, {&(0x7f0000000240)="c855b8a6c3365e2a8beba595c652a8911d0eeb24a3bd6eefd08d51716bd553ae35da35151a", 0x25}, {&(0x7f0000000280)="1d805b3c68c4faf39d43fd0c45991dd772f074b370c570328f35f321d76980c3575a0370f642ebcdc80c17264240378bce23fb804590bc88413ec72a4dcdfd482c63655f27b5c573cc15c327a73ec0d8c4dac0c64ad67e906f69f880d3035765ef831574d0ac198dd056274a5783b8297f14f24258d9721379c03f34e55d5a30e6ac0e40ed9d1d2a90018fd250057c46c8eaf42dcc70e779396e9414ecd7dc9c95da17a4db0bbf1673eefc6ee86d1e23b28cbf5a332dfcdbf5980f156879f8fa329ec059ade8e52c58e83a58cd7aaaa02c", 0xd1}, {&(0x7f0000000480)="0ec4585ab79f28b0ab6f11c794a45d7d8d4064f98f6d4ae363e74a6bb75f46e2a760c1ed74e824bdabf1abbc737fb470b599c33e4dfa38e9d395c264bd16bbfde14cfdd077782735e75c34c0236762d8f9e51df10ed46750dff03fb533f84b41c4de405b5c38c78d5061c3e6c7f1a862a0503758f1af96b2cbe6fcdd9c84df5a42d1bb3146b1fe0c0bfcbde534563148d6eecf80e0426c49fd2f64f518e37ed449e9532668d7d5385757e8e6bb9af54dcf0534d31702f41ac10fb22d4890755e97699d573968be7275", 0xc9}, {&(0x7f0000000380)="94c594583e4b8170a2ffdd85eedff58ea54340f9f7bf79dbba29bf2940fde20f97bd73adad52e473278cb898ff651e0c1aa9084e10633798329f3a41", 0x3c}], 0x8}, 0x0) 04:09:39 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:39 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:$\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 569.013859][T22741] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x0, 0x0) recvmsg(r1, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x1) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x2, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], 0x0, 0x6, 0x0, 0x0, 0x41000, 0x0, [], r2, 0x14, r3, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000040)={&(0x7f0000000140)="10d3edd87c60a80f8f405dd906169bb4e27b207e2667fd9d0529dfdd33e7ede7f947dc4cfe54070299e4d02969bf29cda148ab636e3df473b7179acfd9ba4afb7c0be647c77a2a873d1acaa0d98e11946c705e6a485c6a4bbf51947319631438f4fe6c3326c5b068f5b7195ef7c0481f3cc4587544be43a629d330d5a909a20d46215eb5d46444b37df3bb4f1c53751634b61c3280fe18788ee2b70ab61a3add8b8e7512de2d42e8be57de90aeef9c145cdc696dfc8f65b135df0416548cde2ebcdcf0da9a80b0884544", &(0x7f0000000240)=""/187, &(0x7f0000000300)="114c4932e27416adf92662248900cb8720665e3367c09df6599505b928e9f6ec2d8dc89ac1718a464f14aa6bc9b3621c792a58751a28beb391445f96e20719c88a2746dbd5ea48162eb2f3e9996049c8b1be71b88e3bcf7696ff5b7e9e8d94d6cd25a0c586572181ac3a104e0633ceee25fc004b8c1ee863857eac3f2c56478a60769a5391aade12d2a9d22ae7bb3572555ae4468e06075bf67bc413288918aefb324b676b10", &(0x7f0000000000), 0xfffffff9, r3, 0x4}, 0x38) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) r4 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000000)={r1}) 04:09:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:40 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:%\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 569.401730][ T208] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 569.435322][ T208] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 569.526172][ T208] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 569.533678][ T208] batman_adv: batadv0: Removing interface: batadv_slave_1 04:09:40 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:40 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r11, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r10, 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r12, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) [ 569.609466][ T208] device bridge_slave_1 left promiscuous mode [ 569.615748][ T208] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.754353][ T208] device bridge_slave_0 left promiscuous mode [ 569.765580][ T208] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.890687][ T208] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 569.914713][ T208] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 569.969898][ T208] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 569.987074][ T208] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 570.025693][ T208] device bridge_slave_1 left promiscuous mode [ 570.053621][ T208] bridge0: port 2(bridge_slave_1) entered disabled state 04:09:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r6, 0x800454cf, 0x0) r7 = getpid() r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r7, 0xd, r8, 0x0) r9 = perf_event_open$cgroup(&(0x7f0000000240)={0x2, 0x70, 0x71, 0x7, 0xff, 0x80, 0x0, 0x0, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xffffff80, 0x2, @perf_config_ext={0x80, 0xd7}, 0x0, 0x40, 0x2886, 0x4, 0x7, 0xffffffff, 0xffff}, r8, 0xb, 0xffffffffffffffff, 0x4) close(r9) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) r10 = socket$kcm(0x2b, 0x0, 0x0) recvmsg(r10, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x1) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r12, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x2, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], 0x0, 0x6, 0x0, 0x0, 0x41000, 0x0, [], r11, 0x14, r12, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r13 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r13, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, &(0x7f0000001600)={0x10202, 0x2000006}, 0x0, 0x0, &(0x7f0000001640)={0x0, 0x0, 0x30, 0x4}, &(0x7f0000001880)=0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=0x5}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='wls\x00\x00\x00\x00\x00\x00', r13}, 0x10) ioctl$TUNSETIFINDEX(r13, 0x400454da, &(0x7f0000007680)) r14 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r14, 0x890b, &(0x7f0000000000)) recvmsg(r14, &(0x7f00000019c0)={&(0x7f0000001740)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001880)=[{&(0x7f00000017c0)=""/185, 0xb9}], 0x1, &(0x7f00000018c0)=""/206, 0xce}, 0x40000020) r16 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x26, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001e280)={&(0x7f000001d000)=@can={0x1d, 0x0}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r18, 0x1, 0x32, &(0x7f0000000d00)=r16, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000001e540)={r16, 0xc0, &(0x7f000001e480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000001e340)=0x20, 0x0, 0x0, 0x0, &(0x7f000001e380)={0x6, 0x4}, 0x0, 0x0, &(0x7f000001e3c0)={0x0, 0xc, 0x1, 0x4}, &(0x7f000001e400)=0x200000000000002, 0x0, 0x0, 0x0, 0x0, &(0x7f000001e440)=0x2}}, 0x10) r20 = bpf$OBJ_GET_PROG(0x7, &(0x7f000001e5c0)={&(0x7f000001e580)='./file0\x00', 0x0, 0xab22d6d8fb67abe3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000001e600)={0x1d, 0x2, &(0x7f0000000040)=@raw=[@generic={0x0, 0x1, 0x3, 0x7ff, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x7, 0xc, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x96, &(0x7f0000000140)=""/150, 0x40f00, 0x0, [], r17, 0xa, 0xffffffffffffffff, 0x8, &(0x7f000001e2c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f000001e300)={0x5, 0x0, 0xfff}, 0x10, r19, r20}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e740)=r19, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001a80)={0x12, 0x9, &(0x7f00000002c0)=@raw=[@generic={0x1f, 0x9, 0x1, 0x1}, @call={0x85, 0x0, 0x0, 0x2c}, @exit, @map={0x18, 0x3, 0x1, 0x0, r12}, @jmp={0x5, 0x0, 0xa, 0xa, 0x9, 0x100, 0x8}, @map={0x18, 0x6, 0x1, 0x0, r13}, @jmp={0x5, 0x1, 0x9, 0xa, 0x4, 0x50}], &(0x7f0000000000)='syzkaller\x00', 0x96a, 0x20, &(0x7f0000000340)=""/32, 0x40f00, 0xb, [], r15, 0x11, r6, 0x8, &(0x7f0000001a00)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000001a40)={0x0, 0xc, 0xfff}, 0x10, r19, r5}, 0x78) [ 570.129673][ T208] device bridge_slave_0 left promiscuous mode [ 570.139057][ T208] bridge0: port 1(bridge_slave_0) entered disabled state 04:09:41 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) [ 570.376825][ T208] device veth1_macvtap left promiscuous mode [ 570.387250][ T208] device veth0_macvtap left promiscuous mode [ 570.404251][ T208] device veth1_vlan left promiscuous mode [ 570.414599][ T208] device veth0_vlan left promiscuous mode [ 570.540971][ T208] device veth1_macvtap left promiscuous mode [ 570.558103][ T208] device veth0_macvtap left promiscuous mode [ 570.578573][ T208] device veth1_vlan left promiscuous mode 04:09:41 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) [ 570.593104][ T208] device veth0_vlan left promiscuous mode 04:09:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:42 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:42 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:42 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 578.848144][ T208] device hsr_slave_0 left promiscuous mode [ 578.897147][ T208] device hsr_slave_1 left promiscuous mode [ 579.016717][ T208] team0 (unregistering): Port device team_slave_1 removed [ 579.030637][ T208] team0 (unregistering): Port device team_slave_0 removed [ 579.042339][ T208] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 579.085065][ T208] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 579.210438][ T208] bond0 (unregistering): Released all slaves [ 579.434975][ T208] device hsr_slave_0 left promiscuous mode [ 579.496194][ T208] device hsr_slave_1 left promiscuous mode [ 579.617805][ T208] team0 (unregistering): Port device team_slave_1 removed [ 579.630551][ T208] team0 (unregistering): Port device team_slave_0 removed [ 579.644145][ T208] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 579.685346][ T208] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 579.811769][ T208] bond0 (unregistering): Released all slaves [ 579.959549][T22748] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 579.973427][T22749] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1802f0ff6983eec51432050000080000000000001508009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:50 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:50 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:c\x00`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:50 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r1, 0xd, r2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000017c0)={r3, 0xc0, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0x0, &(0x7f0000001600)={0x10202, 0x2000006}, 0x0, 0x0, &(0x7f0000001640)={0x0, 0x0, 0x30, 0x4}, &(0x7f0000001880)=0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=0x5}}, 0x10) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r4, 0xd, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='wls\x00\x00\x00\x00\x00\x00', r3}, 0x10) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000007680)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x15, 0xe, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x1539}, [@jmp={0x5, 0x1, 0x4, 0xa, 0x8, 0x20, 0xfffffffffffffff0}, @ldst={0x2, 0x3, 0x1, 0x9, 0x9, 0xfffffffffffffff8, 0xfffffffffffffffc}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @exit, @ldst={0x3, 0x1, 0x0, 0x9, 0xb, 0x100, 0x4}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x2}, @map={0x18, 0xa}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd9df}]}, &(0x7f00000000c0)='GPL\x00', 0x100, 0x6a, &(0x7f0000000140)=""/106, 0x41000, 0x2, [], 0x0, 0x0, r3, 0x8, &(0x7f00000001c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0xe, 0x1ff, 0x75}, 0x10}, 0x78) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x8d, &(0x7f00000018c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x43, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r7, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={r2, r6, 0x2, 0x1, r7}, 0x14) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) [ 580.166908][T22815] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 580.227395][T22820] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) recvmsg$kcm(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/240, 0xf0}, {&(0x7f0000000300)=""/188, 0xbc}, {&(0x7f0000000480)=""/223, 0xdf}], 0x4, &(0x7f0000000580)=""/145, 0x91}, 0x60) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) recvmsg$kcm(r2, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000000400)=""/19, 0x13}, {&(0x7f0000000640)=""/162, 0xa2}, {&(0x7f0000000700)=""/213, 0xd5}, {&(0x7f0000000800)=""/99, 0x63}, {&(0x7f0000000880)=""/71, 0x47}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x6}, 0x10120) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) socket$kcm(0x29, 0x2, 0x0) 04:09:51 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x02`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 580.619363][T22831] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:51 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x03`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:51 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:51 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:52 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1e08ef880557cc171c4ded4630f027480188f1fd6b2d3f436da9"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x04`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 581.381666][T22833] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="1f000000190081ace4051c22ff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1, 0x0, 0xfffffff1}, 0x0) 04:09:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x05`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x6, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:09:52 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:52 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x06`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 581.962910][T22875] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 582.039380][T22879] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:53 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x9}, 0xc) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000001240)={&(0x7f00000000c0)="d0d05d1d710187e1594fc4ffd94ec77b43babeb5045202f1e8dd0be4ed753c8601affbbc17173e0a5c87d8e58e2fdda2d030df86fc3c7b017cbdf4d5bc51d8905e89dd6d85360b2ea080e961be995b5e0da880c889224665a677d608954629636bad27438e3b318f5b92a0341b10973320d304eb4a065a3e6391297dd5842a13b0b9200c0f9ebb960b71c54203c18cd2c7f383115024be3b45e4020edb", &(0x7f0000000180)=""/4096, &(0x7f0000000000), &(0x7f0000001180)="da55eb5df2f6386cdf7b52557a46bb2ed482cbfb08a1429af654c1068701028c9542a19e07d5154155a8dfbfc9b4a586da4b8d13d276a6c7c72925406a4cf0e373a4ba387e361406c08cbc8d9db06b004a1f660fc955023067aa1d19a6b86de97d868056064650041d696e2b9bf2ba517810cbe90c8b7723cc0798b33d9ba1a39a5e1e8292696e81172ea618da9abb780e0192d336286e26bb9491bef59af1316848a37dff308ba7d35b00b16db0a6ec62933580abaaab01e4fa908c0be5ec35", 0x6, r1}, 0x38) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)}, 0x0) 04:09:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}, {&(0x7f00000001c0)="2ee070242e415d776d86fd54c582d49e86ecaf294704d1a982578e16a9afccc0b81cf8b69d5ccc2d93d249e41c4c322e41ed5cd7cfb513b785c40046f273efa3563b9bb2b045ada33e1ca33266b082d1403f568ec5", 0x55}, {&(0x7f0000000240)="f848a52a7fb53000224df6466c49e541ceed7fc719a50f43bf8f95005bf7fa26e8d044c731eb321f37e23ccc55e25439f0feae3e46e20145772394b3fb3f81dc1bd93d77da1473c9c380d5e1f1543f841ed6eba9c7bad95d62fa87e501eeb72b15866447c8c843e3d67774a877e7135baa384b71923216b4a9c7a7aebdb5908dc02470d9a745f2e8290f8651c659933e8d077332069c485ce0e8eaf8ad86945cb0905ce795cc90406e3f3ae7239d2366b15ba708db28e6ee6a5811f67f48374f79c64a7ea7ba6aec94d79021", 0xcc}, {&(0x7f0000000500)="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", 0x146}, {&(0x7f0000000380)="b4dacf237c52708199a54980f996b095f090f0aa8b5089bc193ad6ddcb98bdda25f487be9a19dc58f4de293da54bc66e11c5b402f38d9e2d1e154c28fed06837d463dc11133f51a571356e722d8c16c3f23085f38ca41511b941d7b2dc420024edfc59dde58cfb885c8fe177bba5a92a48d8e31ef1e700febbe888171d9feaacea295e7f71dd17e5a4ca9ff60be36be924926daffad296", 0x97}], 0x5}, 0x0) r1 = gettid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305839, &(0x7f0000000040)) close(r2) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x40, 0x6, 0x80, 0x46, 0x0, 0x0, 0x200, 0x9, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x2, @perf_bp, 0x120, 0x9, 0x8, 0x7, 0x4, 0x4, 0x9}, r1, 0x10, r2, 0x9) 04:09:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x4, &(0x7f0000000000)='GPL\x00'}, 0x30) r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x80, 0x7, 0xa2, 0x9, 0x0, 0x3ff, 0x404, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000300), 0x4}, 0x5000, 0x10001, 0x2, 0x6, 0x8001, 0x200, 0x8}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x2, 0x20, 0x69, 0x2, 0x0, 0x2e, 0x5400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x6, 0x3}, 0x4810, 0x734, 0x17e, 0x6, 0x9, 0x7ff, 0x800}, r1, 0x6, r2, 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r3, 0x0, 0x0}, 0x10) r4 = getpid() r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r5, 0xd, r6, 0x0) openat$cgroup_ro(r6, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) r7 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x890b, &(0x7f0000000000)) sendmsg$kcm(r7, &(0x7f0000000700)={&(0x7f00000003c0)=@phonet={0x23, 0x8, 0x0, 0x8}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000580)="fe31c46cbd66e09df9cf3317f3ad9124eb12663a1c8b12472c1ae92104a5ce8fa878a1105769357d0b3f331586f60be7ff8261204bb430537bb156fd7d4066b702364e98c96b9560a0b6e5e954a95c4e9132af2abea27c7e9c8f62dc5ff468400806a591ebbd8234b736178e44cf454cf4de62c9ce2e299dfee26f74f7e8ff8691104fcdc45664ef0f5be1f0ea79fe2ecabf9ae193260f20d62f19af5e79", 0x9e}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000000640)="c18ed4d645611a36a8af247a53eba7b55beca37160e7b768d29146f3394b8e279fdde91d4d223d4334e02420db33057f7a94c311fed7a94232fca5f256daa343d35596962a217ceaa07b77a77b0d5bebd973fae4d849dea71907bdbd1f97545d61c3d16dd9dd8726c8895612fea2705b02dcb2ac42679558176f8262852d04abb24591c012d95a143e310e83017ac0895afd7c6aceeed37a38", 0x99}, {&(0x7f0000000440)}], 0x4, &(0x7f0000001980)=[{0xf8, 0x10d, 0x8, "f128c1fa37635a05e8d35f22f1a04a4b11b4f5fa1799e77eaa020f2cd855d74008804f2e84eba5f174d03240db63ce6b40e598c7ee66eddfc0dfb0f09ecca9f1fc1e94e7c9657d0613c26c01bd481516c8584844560b195dc0320836c43e7d65278d1c4ae760e1c195d3f6d585807d37533c1215e80de37084de52a9103ce6b5b8f35f20fa007519367d8eb15ec63cf7c2488bface1e890ba047c4217437e7ef7f64c02bf59b29ae29a2a9c6caf6e396cb9f1d8c1854a53cfa91d25641f8333ba0c943645ccb0b750c923666b2bb15201435699da15394b38facc387f0f9d988d2387f42d3"}, {0x1010, 0x101, 0xffff8000, "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"}, {0x50, 0x113, 0x7, "ffdb485818b60bcdeb4e00ff32d0c91084c38c5b6fb22f8858fdbfe0ec9d34b8ee86b37b5e36144223ae8080f0477e4c171b04b9b6e09b16a44e22126de2"}, {0x88, 0x11, 0x5, "aa8b642b0ee1a7b68377c6d1130e883c5d78cb913c82d4f3f0cbd834b1fc97428f99c7e2f4ed572af04f42f0cf690c2b4f21a92a7f1edf1bedeac0fcc7c172470b217b80809680935b6fe6391a2f3e423bfe58235a9367af340efa6f480d55967129811dbe536ad64037c7f13290ad6f2ff3"}, {0xa0, 0x11a, 0x4, "d1152922a7f7bd5270a22d24c98310f353caa0343fe006e3fbd7a87e1fb3fa2f90e48bfbf87e1af2835915de6f3ecf874bc64c3cc62fd294ee2ed7ab93a2dd566aef474233c4352f64d38abf4458dcc92990be75e7c212fbef48c879bd7b891c737013f0b2994a8cd3cfe8d6ef934138c8cf61405589bb55f69d406339f7bb3f25fc91920a01dae978"}], 0x1280}, 0x80) perf_event_open(0x0, r4, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r8, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r8, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:53 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) [ 583.091089][T22894] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\a`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 583.138580][T22894] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000200), 0xa73ec) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f0000000000)={0x2, 0x0, [0x0, 0x0]}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r6, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000140)="939233dce1fd7ed5964c2d9b75b3ceff66c1d1b505b7686538d7845a9641c5287b40879dba9e048c3fd5ecc7a925893585d818e30fae5eedcf0701e70c05cb3ab281faa96fdc31ceffc565e4be566d74676eb14107ce5debe0330f3fb682a38be2b468a51602590c691befcef6dc773676dde3f5cc6615f6567e857d4060a2", &(0x7f00000001c0)=""/99}, 0x20) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000), 0x4) 04:09:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\b`\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 585.302761][T22939] IPVS: ftp: loaded support on port[0] = 21 [ 585.379194][T22939] chnl_net:caif_netlink_parms(): no params data found [ 585.428693][T22939] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.435837][T22939] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.448298][T22939] device bridge_slave_0 entered promiscuous mode [ 585.457328][T22939] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.464431][T22939] bridge0: port 2(bridge_slave_1) entered disabled state [ 585.472560][T22939] device bridge_slave_1 entered promiscuous mode [ 585.495186][T22939] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 585.512117][T22939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 585.536778][T22939] team0: Port device team_slave_0 added [ 585.544705][T22939] team0: Port device team_slave_1 added [ 585.563482][T22939] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 585.570632][T22939] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 585.597994][T22939] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 585.611615][T22939] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 585.619186][T22939] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 585.645320][T22939] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 585.729016][T22939] device hsr_slave_0 entered promiscuous mode [ 585.776451][T22939] device hsr_slave_1 entered promiscuous mode [ 585.816154][T22939] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 585.824487][T22939] Cannot create hsr debugfs directory [ 585.911920][T22939] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.920250][T22939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.927936][T22939] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.935415][T22939] bridge0: port 1(bridge_slave_0) entered forwarding state [ 586.000016][T22939] 8021q: adding VLAN 0 to HW filter on device bond0 [ 586.014657][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 586.025357][ T2721] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.033946][ T2721] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.043354][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 586.060702][T22939] 8021q: adding VLAN 0 to HW filter on device team0 [ 586.075331][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 586.085060][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.092191][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 586.110870][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 586.120569][T15445] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.127809][T15445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.148234][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 586.166692][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 586.174780][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 586.184010][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 586.198996][T22939] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 586.210737][T22939] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 586.220250][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 586.253294][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 586.261876][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 586.276958][T22939] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 586.348113][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 586.373579][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 586.381941][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 586.391442][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 586.399844][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 586.411063][T22939] device veth0_vlan entered promiscuous mode [ 586.428659][T22939] device veth1_vlan entered promiscuous mode [ 586.455690][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 586.464606][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 586.473820][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 586.482961][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 586.494772][T22939] device veth0_macvtap entered promiscuous mode [ 586.510146][T22939] device veth1_macvtap entered promiscuous mode [ 586.531350][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.541981][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.552284][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.563080][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.573377][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.583991][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.593887][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.604381][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.614338][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.625147][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.635240][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 586.645787][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.658802][T22939] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 586.667673][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 586.676948][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 586.685077][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 586.694056][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 586.705777][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.717072][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.727706][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.738505][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.748413][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.759177][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.769060][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.779654][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.789707][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.800352][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.810289][T22939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 586.820826][T22939] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 586.832212][T22939] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 586.841820][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 586.851457][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:09:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:58 executing program 0: ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000000)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:09:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a``\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:58 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000040)) close(0xffffffffffffffff) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:58 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 587.564606][T22958] __nla_validate_parse: 2 callbacks suppressed [ 587.564617][T22958] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 587.677941][T22965] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:58 executing program 0: unlink(&(0x7f0000000000)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0x7f, 0x8, 0x80, 0x2a, 0x0, 0x6, 0x90004, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x80000001}, 0x882, 0x1ff, 0xafe, 0x9, 0x4, 0x4, 0x3}, r0, 0x8, 0xffffffffffffffff, 0x4) socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace41cfe7084bce26a23480b0e0001190000000000000000", 0x1f}], 0x1}, 0x4044090) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) r3 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000000c0)={r3}) 04:09:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x0e\xc0\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x8, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x2, 0x7, 0x6}, &(0x7f0000000180)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x80}}, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:09:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00\xff\x00\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 588.242566][T22982] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 588.348807][T22984] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:09:59 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000040)) close(0xffffffffffffffff) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:09:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="7f7f830e49521b62e2ca8c9f38c298fa8df1b9a889bacd705599a0decbbe2958b494e293bd75425226e482d5822d4354e4264757360b81972e41d4539c533bbb1963996ca234f6d741a940fda503beaf2c28a9463d55751eb099048bf9c475c680e59b3b3f3a469efc4ca8e3a891f12ccf2be44c209685451480ff91496e6befa3e1ff1f41c38aceee890a38e1c00b61fe", 0x91}, {&(0x7f0000000000)="d76819e73d853b59c6b7c391a8", 0xd}, {&(0x7f0000000200)="3f7f6dd22b34f5a762401f8167ae60e58602b7699d1e9aa2e2ef4c317c73a10be8bdd492262653877b0d442290f814aedc9b1ff22072a43b5f2d0dd8ab7c4eed6e60b8e4fbf4ccf79335603d64ed47e375559e85698519aaf0f185b9c80f65cc5fdcb84b63f7d2af22d5b5", 0x6b}, {&(0x7f0000000280)="30bec63b53c8873e322a00fcc5dda9bce546347c53285070ae8f55af8807e5002e22554d75d2bf9fb0cf5bb9410b344e10cca1211b584d5886e8162a96da0af45894f1fc86348c10f9c4ad6ca2ffbabdb35bad", 0x53}], 0x4}, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r1, 0x0, 0x10}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r1, 0x7, 0x10}, 0xf8db04159f9300be) 04:09:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00\xc0\x0e\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:09:59 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:09:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r6, 0x800454cf, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000040)) close(r7) r8 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x80, 0x7, 0x5, 0x0, 0x1, 0x2040, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x800, 0x8, 0xfe0, 0x3, 0x5}, 0xffffffffffffffff, 0xb, r7, 0x4) r9 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x1, 0x80, 0x8, 0x40, 0x0, 0x2, 0x2002, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x1010, 0x3, 0x4, 0x3, 0x0, 0x7fff, 0xd8}, r3, 0xb, r4, 0x0) openat$cgroup_int(r5, &(0x7f0000000380)='memory.low\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r9) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:09:59 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000025c0)={&(0x7f0000000380)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f0000000640)="2e805ec0f1615be88ca3cbef3c0be5dad2fffea37bb8c2403b908b5c7a898e0756fc0c0de6a9570cc1d9544a6c4d46637a70bbdc02fa65130ffbaa3f572d444b98658fbaa5", 0xfffffffffffffe89}], 0x1, &(0x7f0000002500)=[{0xa8, 0x84, 0x7, "c4deaf8155965c03d7fdb3cb97cf7e3ef4f5dfe573e3a7bd8e291530ff8bb28d4c968f8aced809886bebcc005b2c7dbe9758427281f23124e592e3d8b462e2885b3bc38abf51339965830632f78ee94c006666a33c1d7bb53f4dcc967b392af9205062405124451560a5768a3ac434f5b1a17ae103cbd522683899b17ceeb497f1176454322a989607de7f44c09271d28885a7"}], 0xa8}, 0x800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xa73ec) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000600)={r1, &(0x7f0000000500)="da833530e7c065879f4b60a81851b34d8203844b9c0eb71920e3fe32c5c106f2f4933226d12f376a37c59b1008126839d5d6500014f4c34e38a7ecbdbc2f4de55d4ca40cc460f4f48f08bb43186afbdac3e012171f281f1ed6ef44496f5ff89b5a02f71478e40ef65ba7178a7fe43d15be90154740e598dbc047c24a3b11dd55f2b9b02d0d9a458bffc39bfc262ff2b2ff295dc5795e23b2b953c717a2706966be60a5f3a16d1427d74b3b29b1", &(0x7f00000005c0)=""/6, 0x4}, 0x20) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) r4 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x890b, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x4, 0x2, 0x3, 0x2, {0xa, 0x4e21, 0x36b, @loopback}}}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)="db28f85cf651067756a2124a3d69f14bfd845d6e6c44fe5b03f23102e791155f208e6cc1f2e2", 0x26}, {&(0x7f00000001c0)="3c4988f2e32d51cd09f5d0179760e98139610497c8c11fe35c5226da4a", 0x1d}, {&(0x7f0000000200)="66eae87ddca904f7c38ec71555c08824a8576b0c42f95d47cd7e77f31c8d166c91913a32955bb82244c22a69bda18fb0424e87bbc245fa4bb0cc6535f5da55d9b42041016eaebbd1ff5e4383b87876f7cb7d7c16858fc0371ba3f877ac0aa5ea61bac35c69f8a5adc32ed9fc9628f624729ae43190c5910e7b8c9bafadde50a8e35043c6a9f6c37fce27504d90e60e63b1728f229290f6", 0x97}, {&(0x7f00000002c0)="4289dcd5620333d5dd031661ccd34ce1d19e9f63de9b1e06bfe47a", 0x1b}], 0x4, &(0x7f0000000480)=[{0x48, 0x110, 0x9e2, "74c4fb66c40e961c713fbbca22d14fb570d6f162283c4dc134c8ac001a798c78755cc237285b0b083e36ff7275f8605d38436aacfb0e6e97"}], 0x48}, 0x8000) 04:09:59 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x02\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:00 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000040)) close(0xffffffffffffffff) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) [ 589.061533][T23012] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x26, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001e280)={&(0x7f000001d000)=@can={0x1d, 0x0}, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000d00)=r2, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f000001e540)={r2, 0xc0, &(0x7f000001e480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000001e340)=0x20, 0x0, 0x0, 0x0, &(0x7f000001e380)={0x6, 0x4}, 0x0, 0x0, &(0x7f000001e3c0)={0x0, 0xc, 0x1, 0x4}, &(0x7f000001e400)=0x200000000000002, 0x0, 0x0, 0x0, 0x0, &(0x7f000001e440)=0x2}}, 0x10) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f000001e5c0)={&(0x7f000001e580)='./file0\x00', 0x0, 0xab22d6d8fb67abe3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000001e600)={0x1d, 0x2, &(0x7f0000000040)=@raw=[@generic={0x0, 0x1, 0x3, 0x7ff, 0x3}, @jmp={0x5, 0x0, 0x0, 0x0, 0x7, 0xc, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x7, 0x96, &(0x7f0000000140)=""/150, 0x40f00, 0x0, [], r3, 0xa, 0xffffffffffffffff, 0x8, &(0x7f000001e2c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f000001e300)={0x5, 0x0, 0xfff}, 0x10, r5, r6}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f000000e740)=r5, 0x4) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x5, 0x4, &(0x7f0000000000)=@raw=[@generic={0x0, 0x0, 0x8, 0x3f, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @ldst={0x3, 0x225a4ee4410d4de9, 0x2, 0x4, 0x5, 0x100}], &(0x7f0000000040)='GPL\x00', 0xe39, 0x0, 0x0, 0x41100, 0x2, [], 0x0, 0x16, r1, 0x8, &(0x7f00000000c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0xf, 0x7fffffff, 0x1}, 0x10, r5, r7}, 0x78) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:10:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x03\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 589.450196][T23031] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 589.522608][T23034] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:00 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x890b, &(0x7f0000000000)) r3 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x890b, &(0x7f0000000340)={r2}) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x1, 0x0, 0x4, 0x5, 0xa, "9d8c52761c7005e16427f1468b16a4d4a9e5279137344d214a972159c7eaaadc1557276bbec3e545d25fd97858789b73f3fb39157979e165e064c6d0a892b1", 0x14}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="06d7da07", 0x4}, {&(0x7f0000000140)="fac8dfa5f0feccec8dbd8e5c0a91b4a75f37387b535f099af6f610b5f030ad54524ff6cd9b9f40d619ec0efaecf7a96843d513dbc83176a25055ec", 0x3b}], 0x2, &(0x7f00000001c0)=[{0xb0, 0x1, 0xffff, "20e538c0c8db8539921e4db100175c61ed0abee3250118f640d783226c261c095c762e5f45688b35698a64cfa26497572b645765475fe7d3fbe23b03853d521693dc0624550235771228217d7c1ae5c0bbc35c74c0ee8511eadcf79ec57d511e575efba592482fd2f464c51b4c04dd65060fb18d43d751bcef9d3727ac17f0f0e722f8efffd861ab978763b6e403de8f6dfc22c3280377b0091f63e0"}, {0x10, 0x110}], 0xc0}, 0x800) socket$kcm(0x29, 0x5, 0x0) 04:10:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x04\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 589.882166][T23048] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x0, 0x2, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000008009ad3a5bbe11d39519500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 589.952772][T23048] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x05\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:01 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:01 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)=""/88, 0x58}, {&(0x7f00000000c0)=""/43, 0x32}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/6, 0x6}, {&(0x7f0000000600)=""/230, 0x20}, {&(0x7f0000000380)=""/127, 0x7f}, {&(0x7f0000000480)=""/215, 0xd7}], 0x7}, 0x20) r0 = gettid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0xa73ec) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000a40)={r1, 0xc, 0x0, 0x401, &(0x7f0000000a00)=[0x0], 0x1}, 0x20) r2 = perf_event_open$cgroup(&(0x7f0000000980)={0x1, 0x70, 0x5, 0x20, 0x2, 0x2, 0x0, 0x5, 0x20208, 0xe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x7, 0x10001}, 0x800, 0x2, 0x8, 0x8, 0x1000, 0x9, 0x1f}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000900)={0x3, 0x70, 0xcd, 0x3, 0x8, 0xc1, 0x0, 0x1ff, 0x40000, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0xffffffff}, 0x40, 0x4, 0x2, 0x3, 0xd02a, 0xfffffffa, 0x20}, 0xffffffffffffffff, 0x1, r2, 0x2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040)=r0, 0x12) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000740)={&(0x7f0000000700)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000015400)={&(0x7f00000151c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f00000153c0)=[{&(0x7f0000015240)=""/76, 0x4c}, {&(0x7f00000152c0)=""/219, 0xdb}], 0x2}, 0x2001) r5 = getpid() r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r5, 0xd, r6, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000156c0)={0xffffffffffffffff, 0xc0, &(0x7f0000015600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000154c0)=0x1, 0x0, 0x0, 0x0, &(0x7f0000015500)={0xa, 0x1}, 0x0, 0x0, &(0x7f0000015540)={0x5, 0x7, 0x7, 0x96a}, &(0x7f0000015580)=0x5a62, 0x0, 0x0, 0x0, 0x0, &(0x7f00000155c0)=0x1}}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000cc0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe163a255c33282044b324953c0a9fa9a84452569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f0a1970b8ab5136b1e182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222674280f55e98107450c19b9d8679406419860d4669df2dc9cc240e406bf0c5329bd5b4697336112b0b8754ce35b702b6fa8edfff8faf8b8ec020bab385cac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ccd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e9b1106f3bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f5e97e6e6aeea15c6d55badf9b86b1c28adff556e60cd06c9ed24313ce607d45ebb6030f84b63aaf8690db0221b1705c501f802ff59b4e683efa4b6e77e042072bd2ac37d413008ec9eb8166f6e28b49a77ed91befc65315878f88a8fb1dd679fb4c5557abae6849917dc51a89d47b728502f7e621fc0e3baa7579179c149ee6601728c750930519339b44197c22da8650579475afd96187d881e93b42a5fdfd686d8900c44c67133eeb0109dcb60dddad58037fda65885a15a429edfe3027a5ebf95254744f10fd6d0f1b9684d8720776e07bc3100b94932b8d9447c4df6e21ee0e54f8be072e0b083bbd86b19f857311a2f14326b0c290205e91a682e00c8762cbc6b904c980eef6e6a1def886c95676dce6a8194479700a02b92bdc8d05eae1f24fdd7b80d3dde04c22f681594219de8d7027934fb0f6d823c1d863ac83823feb402a2415a9850d5f0183ec67be96dc0e4acd7acf1dfe79d6771903b66e21190c22d641030e1ddac018dc3116e1803af20a5f2b5f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5f000000000000000000da186752fb1834450840dbdbb6e0fd10778beb2e6926ace426a4ed1eca9a12ee81f7cd8150ad2e1a4133c56afaf373e2782baa72fc1813fae2e084524000"/1133], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r8, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000015700)={0x4, 0x9, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000007000000000000000200000059810100080000001800000003000000000000000700000074203000f0ffffff18200000", @ANYRES32=r3, @ANYBLOB="00000700010000009500000000000000"], &(0x7f0000000800)='syzkaller\x00', 0x1, 0x3f, &(0x7f0000000840)=""/63, 0x40f00, 0x5, [], r4, 0x15, r6, 0x8, &(0x7f0000015440)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000015480)={0x1, 0xe, 0x7, 0x8}, 0x10, r7, r8}, 0x78) r9 = getpid() r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r9, 0xd, r10, 0x0) r11 = openat$cgroup_ro(r10, &(0x7f0000000a80)='memory.events\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002140)={r11, 0x0, 0x9a, 0x1000, &(0x7f0000000ac0)="d682381c36e1d23944af4bb4919eeae8a77ca263ec8b7f437cfbbc872517a7940d8c82e461015022e8b20e0b6867adcb414ba61bfeff6fed4b0d648593694beefd98082ccbb82bae9470dec19e8ad6e2afcd04d7124e7c38fdc5cfb1b73b4bf7653e2fe5fa36ad30652dafbfac186d3de35e1234b70329fcaaa1d46e54711bbaec3f271e89109436ee27744b0d0b62bb503320c928487ecfbdf9", &(0x7f0000001140)=""/4096, 0x7ff, 0x0, 0x88, 0x5f, &(0x7f0000000b80)="fb8908dd1478bbcfbd24e318fd446af66ab85f19c6177af66ae42d804be1ebbb2db6e3a07379bead242a25ff40e5f3fc7fdda1394ddeabe45dcebabc43bc7cb600e56ad2a42405ae0a025e4bce9157a517d3c6bd22c5880d36d9ade158f3787c7b954413cddfd4a7a6cae1f362ae883978a3f6f7c6e977d6f8a9caf1ec5b8ecca8764505d3862d85", &(0x7f0000000c40)="66da9f09fcc9e858651a81a8c701fa747669ab79b6938dc7e44b12d4878756395769bd6ebdd5c35c595e0a82798d85ba2576d958707a1d068708a247f4a44701d3692e513878cd38aa18299d21a70174d516d8efdac4b1a800bd951b4995ef"}, 0x40) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x8, 0x3f, 0x7, 0x0, 0x0, 0x5, 0x4400, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffffff7f, 0x2, @perf_config_ext={0x2, 0xffffffffffff9c65}, 0x46a23, 0x5, 0x3, 0x2, 0x101, 0x7, 0x3}, r0, 0x0, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)) 04:10:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x06\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:01 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x0, 0x9, 0xde, &(0x7f0000000040)="7581cf31d82ac76b01", &(0x7f0000000140)=""/222, 0x0, 0x0, 0x95, 0x6e, &(0x7f0000000240)="3489de78f467668caf3a894fbb943ff7bb94a9a9cc6ae1eefb5d07bc5601e4b07ad27fb139d87b3e23a28f1e6a5caf01d87fb1d9c9e6ed41032d547ed309ed010077246fca31bf8eb373a9aa9ccb71cc15a6e21ab30a93c7e1de42c8cdc1b7f62b9fc933ae222aa0fd0ca0182409440d283c400b1705101741f5dc9bb9ea39cb8002826606b6adb0bec890e8b0383383e6e0ade461", &(0x7f0000000300)="4b6afe7efdf822de3a8b00d28231eb6f87efbd9d2aa0716175f92a5c7530a5323b5b0b69c0488438f037d10a12f4564d41e1d08546419e52cafa7aaf51156a9e1deca1cb9799bf0e9e33c369d4e91114e8f4a06c6258d1f16db17559e8459459c5acb7acd9a0cbd789f26b2ef5a4"}, 0x40) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) socketpair(0x4, 0x1, 0x1, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000940)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000026c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010000000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe163a255c33282044b324953c0a9fa9a84452569957c1002ed7d4d8e17f791f4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee88518ddf12dddd4bfc6a4dd3b6beba51074229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de26ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d664325540cfe93bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885bbf597a14ab2458e6272d88e0c8088f404f1a1970b8ab5136b1e182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defd0a8be3b69ce3e4f361aca75827426dde87fdf4617222674280f55e98107450c19b9d8679406419860d4669df2dc9cc240e406bf0c5329bd5b4697336112b0b8754ce35b702b6fa8edfff8faf8b8ec020bab385cac0535373bb8fab90539b1a65ddff841eb671f7faf37ebdfccea0c002ad2b42047c9ec43193ccf617dbf8a12b4a189edbf9fb7c42b1f435ccd4d96822e6b70b62912c926dbe417cccc4f696d528fa8a3ea847f10e9b1106f3bb506f1d7fbdf84b1b06af9fb654eb6c028eb5b5a073d0de5538ab42e170b3baae34c35987b0dda497ac3f5e97e6e6aeea15c6d55badf9b86b1c28adff556e60cd06c9ed24313ce607d45ebb6030f84b63aaf8690db0221b1705c501f802ff59b4e683efa4b6e77e042072bd2ac37d413008ec9eb8166f6e28b49a77ed91befc65315878f88a8fb1dd679fb4c5557abae6849917dc51a89d47b728502f7e621fc0e3baa7579179c149ee6601728c750930519339b44197c22da8650579475afd96187d881e93b42a5fdfd686d8900c44c67133eeb0109dcb60dddad58037fda65885a15a429edfe3027a5ebf95254744f10fd6d0f1b9684d8720776e07bc3100b94932b8d9447c4df6e21ee0e54f8be072e0b083bbd86b19f857311a2f14326b0c290205e91a682e00c8762cbc6b904c980eef6e6a1def886c95676dce6a8194479700a02b92bdc8d05eae1f24fdd7b80d3dde04c22f681594219de8d7027934fb0f6d823c1d863ac83823feb402a2415a9850d5f0183ec67be96dc0e4acd7acf1dfe79d6771903b66e21190c22d641030e1ddac018dc3116e1803af20a5f2b5f7ba58aca5bcabbbab24414a3810788e5503e4be66d683daac5f000000000000000000da186752fb1834450840dbdbb6e0fd10778beb2e6926ace426a4ed1eca9a12ee81f7cd8150ad2e1a4133c56afaf373e2782baa72fc1813fae2e084524000"/1139], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) r4 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x890b, &(0x7f0000000000)) recvmsg$kcm(r4, &(0x7f0000000900)={&(0x7f0000000640)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000840)=""/176, 0xb0}, {&(0x7f00000016c0)=""/4096, 0x1000}], 0x2}, 0x10021) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r3, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000400)={0x9, 0x3}, 0x0, 0x0, &(0x7f0000000480)={0x2, 0x8, 0x8, 0x7}, &(0x7f00000004c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x5}}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x8) 04:10:01 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r2, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x471b) r3 = getpid() r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r4, 0xd, r5, 0x0) openat$cgroup_ro(r5, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r3, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0x8, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7f166591, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x0, 0x1, 0x0, 0x9, 0x4, 0x8, 0xfffffffffffffffc}, @map={0x18, 0x4, 0x1, 0x0, r7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1f}]}, &(0x7f0000000280)='syzkaller\x00', 0x800, 0x0, 0x0, 0x40f00, 0x5, [], 0x0, 0xe, r0, 0x8, &(0x7f00000002c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x3, 0x4, 0x7, 0x1}, 0x10, 0x0, r2}, 0x78) write$cgroup_int(r6, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r6, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\a\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\b\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:02 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00``\x00 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:02 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:10:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x03 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:02 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) r6 = perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x8, 0x81, 0x1f, 0x7, 0x0, 0x716673de, 0x10000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000000), 0x3}, 0x8004, 0xff, 0x40, 0x6, 0x1000, 0x9, 0x80}, r2, 0x5, r6, 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r7, 0x800454cf, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x17, 0xa, 0x370, 0xfffffff8, 0xcc, 0xffffffffffffffff, 0x400, [], 0x0, r5, 0x3, 0x1}, 0x40) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)) recvmsg(r9, &(0x7f0000010dc0)={&(0x7f0000010bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000010d40)=[{&(0x7f0000010c40)=""/129, 0x81}, {&(0x7f0000010d00)=""/39, 0x27}], 0x2, &(0x7f0000010d80)=""/34, 0x22}, 0x40000022) bpf$MAP_CREATE(0x0, &(0x7f0000010e00)={0xa, 0x9, 0x101, 0x1, 0x231, r8, 0xd0, [], r10, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 592.011329][T23128] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:03 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x05 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="1f00ca8c00ace4051cecff091f989b6799a61cfe7084bce26a23480b0e72f3f7cee471e5efbc1695a8fae628", 0x2c}], 0x1}, 0x0) 04:10:03 executing program 0: r0 = perf_event_open(&(0x7f0000000640)={0x3, 0x70, 0x3e7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x91dd7106ca8f533b, 0xdb3fedb3c3734f95, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x40000000000, 0x0, 0x1, 0x0, @perf_config_ext={0x7, 0x3}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x20000007, 0x2}, 0x0, 0xc, 0xffffffffffffffff, 0xa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400012) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffff8001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x0, &(0x7f0000000cc0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x5, 0xb5, &(0x7f000000cf3d)=""/181, 0x0, 0x0, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={r1, r2, 0x0, 0x16, &(0x7f00000005c0)='cpuset.effective_mems\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(r5, 0x800454d2, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(r6, 0x800454d2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x400c00) r8 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r8, 0x400454d8, &(0x7f0000001200)=0x80000000) r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETHDRSZ(r9, 0x400454d8, &(0x7f0000001200)=0x80000000) r10 = openat$cgroup_ro(r9, &(0x7f0000000300)='rdma.current\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(r10, 0x800454d2, 0x0) r11 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNGETIFF(r11, 0x800454d2, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r12, &(0x7f0000000200), 0x400c00) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:10:03 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:03 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x06 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\a \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000540)={&(0x7f0000000680)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/78, 0x4e}, {&(0x7f0000000040)=""/49, 0x31}, {&(0x7f0000000700)=""/210, 0xd2}], 0x4, &(0x7f0000000480)=""/173, 0xad}, 0x40000000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:10:04 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00? \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) r6 = perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x8, 0x81, 0x1f, 0x7, 0x0, 0x716673de, 0x10000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f0000000000), 0x3}, 0x8004, 0xff, 0x40, 0x6, 0x1000, 0x9, 0x80}, r2, 0x5, r6, 0x12) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r7, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r7, 0x800454cf, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x17, 0xa, 0x370, 0xfffffff8, 0xcc, 0xffffffffffffffff, 0x400, [], 0x0, r5, 0x3, 0x1}, 0x40) r9 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r9, 0x890b, &(0x7f0000000000)) recvmsg(r9, &(0x7f0000010dc0)={&(0x7f0000010bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000010d40)=[{&(0x7f0000010c40)=""/129, 0x81}, {&(0x7f0000010d00)=""/39, 0x27}], 0x2, &(0x7f0000010d80)=""/34, 0x22}, 0x40000022) bpf$MAP_CREATE(0x0, &(0x7f0000010e00)={0xa, 0x9, 0x101, 0x1, 0x231, r8, 0xd0, [], r10, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 593.348554][T23179] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:04 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:04 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000040)) close(r7) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r7, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r8}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r11, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r10, 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r12, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00@ \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00` \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 594.125739][T23179] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1000005b}, 0x40008c1) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vlan0\x00', 0x7302}) ioctl$TUNATTACHFILTER(r1, 0x800454dd, &(0x7f0000000200)={0x0, 0x0}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000000)=0x1) 04:10:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\xff \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) 04:10:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x02 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:05 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:05 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000040)) close(r7) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r7, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r8}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r11, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r10, 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r12, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) [ 594.759856][T23225] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 594.805497][T23225] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x03 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = getpid() sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000200)=@isdn={0x22, 0x0, 0x5, 0xb, 0xaa}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="8d5de2686e918e515b2a82b1279a7bf208b71b55ea70dcd33b354fe3f9f4f07e70a39a94f212b7d8e00462bef511d0370d132408e02a58d5e54064705bb3b4250d8c6ffb52b2b142a5e4a85eeab2a0872341afa2243f5717f282452d547dd7e091076525f5b78a40fd119e245cb99c678f8b9fc70a9352ebbfe344136f5674302875a1f60e3d9e16d69ba5f69b0a7ca4fd5963ae82ab2d38178c2944bd62c475d8d5dad41ad0d340fc5591fd855355ee527885e557ab114e66fccd6f6313c102e715167eb1e027533696700196f807ac303840c8afe84eba45226a0c5ae0ad049f612bd14c980652", 0xe8}, {&(0x7f00000000c0)="4a49d4282f8dad283fc2cf9242e917aa81b828", 0x13}], 0x2, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x138}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r1, 0xd, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000002c80), 0x7}, 0x12485, 0x7ffd, 0x0, 0x2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r4, 0xd, r5, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000480)={0x4, 0x70, 0x3, 0x16, 0x7f, 0x0, 0x0, 0x3, 0x20901, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x4000, 0x5, 0x401, 0x5, 0xfffffffeffffffff, 0xbb, 0x2}, r5, 0x8, r2, 0xd) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000500)={0x0, 0x70, 0x6, 0x81, 0x7f, 0x3, 0x0, 0x7fffffff, 0x2106, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000400)}, 0x40002, 0x1, 0x7f, 0x3, 0x2, 0x6, 0x6}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:10:06 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:06 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:06 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:06 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) [ 595.716911][T23241] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:06 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x04 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:06 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)}, 0x4840) 04:10:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1) socket$kcm(0x29, 0x5, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x40c000, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000100)=0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'\x00', 0x7302}) ioctl$TUNATTACHFILTER(r3, 0x800454dd, &(0x7f0000000200)={0x0, 0x0}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x4, &(0x7f0000000080)=[{0x800, 0x81, 0x2, 0x1}, {0x1, 0x36, 0x20, 0x400}, {0x9, 0x24, 0x0, 0xdb}, {0x2ac4, 0x3f, 0x3d, 0x101}]}) sendmsg$kcm(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000a80)}, 0x24004800) 04:10:07 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x05 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 597.893245][T23283] IPVS: ftp: loaded support on port[0] = 21 [ 597.980625][T23283] chnl_net:caif_netlink_parms(): no params data found [ 598.024506][T23283] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.031720][T23283] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.039989][T23283] device bridge_slave_0 entered promiscuous mode [ 598.049460][T23283] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.056792][T23283] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.064704][T23283] device bridge_slave_1 entered promiscuous mode [ 598.090395][T23283] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 598.103029][T23283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 598.128611][T23283] team0: Port device team_slave_0 added [ 598.136817][T23283] team0: Port device team_slave_1 added [ 598.156431][T23283] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 598.163508][T23283] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 598.189566][T23283] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 598.202876][T23283] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 598.209895][T23283] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 598.236211][T23283] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 598.300043][T23283] device hsr_slave_0 entered promiscuous mode [ 598.346474][T23283] device hsr_slave_1 entered promiscuous mode [ 598.386063][T23283] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 598.393687][T23283] Cannot create hsr debugfs directory [ 598.480382][T23283] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.487544][T23283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 598.494912][T23283] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.502077][T23283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 598.570222][T23283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 598.584682][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 598.594999][T18553] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.603290][T18553] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.613317][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 598.629893][T23283] 8021q: adding VLAN 0 to HW filter on device team0 [ 598.647522][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 598.656961][T18553] bridge0: port 1(bridge_slave_0) entered blocking state [ 598.664245][T18553] bridge0: port 1(bridge_slave_0) entered forwarding state [ 598.686648][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 598.695220][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 598.702311][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 598.725525][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 598.734965][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 598.754074][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 598.769486][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 598.784395][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 598.802680][T23283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 598.825482][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 598.833181][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 598.850965][T23283] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 598.920689][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 598.946622][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 598.955094][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 598.963951][ T2747] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 598.975682][T23283] device veth0_vlan entered promiscuous mode [ 598.992626][T23283] device veth1_vlan entered promiscuous mode [ 599.025190][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 599.035379][T18553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 599.050566][T23283] device veth0_macvtap entered promiscuous mode [ 599.063219][T23283] device veth1_macvtap entered promiscuous mode [ 599.084841][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 599.097031][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.110117][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 599.120858][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.130899][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 599.141389][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.151562][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 599.162410][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.172610][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 599.183128][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.194194][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 599.204903][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.214879][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 599.225407][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.241680][T23283] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 599.250198][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 599.259262][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 599.268189][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 599.277151][T15445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 599.289800][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 599.300805][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.311477][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 599.321998][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.331844][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 599.342768][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.353095][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 599.363881][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.373815][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 599.384726][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.394726][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 599.405318][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.415211][T23283] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 599.425679][T23283] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 599.437939][T23283] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 599.448162][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 599.457634][ T2721] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 04:10:11 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x161) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000040)) close(r7) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r7, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r6}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r8}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r10, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r11, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r10, 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r12, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:11 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:11 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:11 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x06 \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:11 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x11, 0x2, 0x8, 0x9, 0xdd, 0xffffffffffffffff, 0x1f, [], 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x4}, 0x40) recvmsg(r0, &(0x7f0000002f80)={&(0x7f0000002cc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002d40)=""/1, 0x1}, {&(0x7f0000002d80)=""/51, 0x33}, {&(0x7f0000002dc0)=""/255, 0xff}], 0x3, &(0x7f0000002f00)=""/71, 0x47}, 0x100) r3 = socket$kcm(0x2b, 0x0, 0x0) recvmsg(r3, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x1) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r5, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x2, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], 0x0, 0x6, 0x0, 0x0, 0x41000, 0x0, [], r4, 0x14, r5, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000002fc0)={0x15, 0x2, 0x400, 0x1, 0x40, r1, 0x8, [], r2, r5, 0x3, 0x1, 0x5}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@l2={0x1f, 0x0, @any, 0x6, 0x2}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000140)="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", 0xfd}, {0xffffffffffffffff}, {&(0x7f0000000240)="35de88878be979d292ea57ca038e133b65f3d1ece98fcad2f92a7ba8ef89e183b4ccc5a503abb8f9b10ef5bdd40742d2720ebb1844ea134987ded46f1f07490a13894e67a1c1c33d3984e10746b565cf0e84deda4c2cc47c8d376b4af07e4b38f6c70617ccfd77931951c3f6b31f1d4d780e6cd7e0f84787a61fb081f8bee187617244f6a30b3a222c5b20f32dbdea5298", 0x91}], 0x3, &(0x7f0000003000)=ANY=[@ANYBLOB="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"], 0x1488}, 0x45) [ 600.184771][T23306] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 600.238069][T23306] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) r1 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890b, &(0x7f0000000000)) socketpair(0x10, 0x6, 0x3, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000001b00)={&(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x2, 0x2, 0x1, {0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x14}, 0xe07}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000280)="8bd27e9c7d295dc0186a7896bbec419e479398e837f0171e65eb935ab7927522cc7d44095cccefc9eb80cfaabb8c6d4d6785f7cb9a872948716eb6f2b2189f79579e928501b0b8f35d43f18c46be0870e95fa0aedf8cb1df87fa64cc9db5fef732a70406cabf596aa90ce0f0d6c481f7be5084f1f905ede52e15155da72c5c5a43d30988af21519e800ed4ff61ecf367f9db2f3ae5d709b12f8a30bbac425e60327a27ed7b348069e886ca13fdaaa02df9e4c2994c3d19f0d46ab01c4ec91a228e1c0cd84fe0849a3216facf5ebdc65a7ac4e3d07e3239f8fe1c5ecf", 0xdc}, {&(0x7f0000000480)="833aefe95c9a244447e8c6e3d3768483c1c785dc0205bb9faf50c9537aceab63cad1e6194dc2883ce77979f779b9b8bd154ad44e5b4e012966d53191a3114f43f9b08c2f5a7bbaf8060d906442456b12dddca95dd6cce568c4c38586de9e45c60d384d7dd28deed1d298a9b869cbaafb9b65d91250b04921066abf0375a1974d47609be7e07b0e02ff23606ee53c7a4e4e55c1ee22a3a6c4c4d8d0123955a6b1759ff1a3a3f8cf964e82fc477dad674244fbf95402272f04b3d0d67453ec1e817859bac578b69a0c2b921f1138dec7862048a8bd873f", 0xd6}, {&(0x7f0000000580)="48360deb071d4343cc37c3e11d67f4af8588c09c1e9db07ef0daf1f3f7762d659af5f8e9de616c2efbf7800eb1bb24f02c74e06d06887dfa70ace6d29b97c20b0063a8815ee817c9df54ba330d20aefe72db210c7279dae4fbe31d352b6426401019a40ebd9ae2e8b5a0658e4e1c0f058c5186d7b8ead91594f2092715d327bada8ed1adfeb57e66910318000750fdb3aed3cd4db4f38f2b839d7645582dee6f3e61e4332e1a86876de3768f790e093971e356be62e33695dbf8831ed0932c68ebb6ba2677b29d1acc99cb4aee926fb044a77bcec6c2f418fa97bc3d2a211808bc39eef9964ce19ae28e7f55b2e02262f6c262ba12f58f6a", 0xf8}, {&(0x7f0000000380)="a504687a9326f7ebaeeddcbeb9c74dae8846984fe5042927e3b0881401935029bde60b4d22c49be568c97bf8f352fa62a0144814ad736ef45ad6d1c9650a2b3166e5ba6d547b5c2f8db065e9b074979962061b01ab92cb77a52cff1510ada1ed06702610836922f76f", 0x69}, {&(0x7f0000000680)="690108bb6d15afff59560be802cc84f45dad9971e3c187150d22eb2189e28f6d13057d4fa34c5a1a0f80be614831827646eb6e051ebca7ff4e7d014e9bf918bd61129cea38ce951567e836da9eecec2fd15cbc3ec490a375de6a0286670ea6dde6210b53fed9c89a39f850f80092899079c32a70983057573335cb851a148cd02c6678694a2cfcf3b0b175a2baa392e74674f5df309ed4e68c21fa38", 0x9c}, {&(0x7f0000000400)}], 0x6, &(0x7f00000007c0)=[{0x1010, 0x29, 0x5, "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"}, {0x90, 0x113, 0x1, "7b05447649c43476397723a66c7cb25822d054cc98ccfe8710e5c839d03c70eb840ed1f117107b89ab8b2e5cc63fa0e654cfce74336fdba69241da2e7a106e428d891d89307fab9e8145904575f7f312a9ec4ee2f923c674ac70556ab8038b8aedc5b8f6c32e23c3269e6c6b80b218b5d5c136ba8cc82b78a729"}, {0x90, 0x3a, 0x1, "a4a34e5b2c1cd8fd245856b128a1f687283db1f126778701cfe3e9e44c92148bcf5615ac0c8a60b7e15619e82530432aca30e9a81b8ff76dcedbc04b46d3e927a82baeb1b2f310a2c6f98e99aeb2a7e2704ac0e45335003322724c2f982e1dbf23f947d157fd6d1c8ac9fd6d1f4022dc8f1403b7ace1618889fadf4e66470023"}, {0x50, 0x10d, 0x5, "fd674ca7fe034318d43f7ec3f9f1172b16c2f81c5506e434bb0ba2a6022bf474d3f27c2867a31952a55ad9d928ce32503243d7c5d10fa889d1fa8cd4080b0cda"}, {0x70, 0x109, 0x5, "09db53109c2a1032cfb2554c88d7e9db25743b68ae0d0635debfee0b6105bd85af8864cb40cece597942f2e0f1a1affefa81e156f35e03e664da31a5f88b179ded8c89eb41ad87b360174f07477beaebfb4d86c9d8e40d8ee419e88c436d"}, {0x18, 0x112, 0x20, "7203c1e8392d99"}, {0x110, 0x105, 0x0, "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"}], 0x1318}, 0x40040d4) 04:10:11 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\a \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:11 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) [ 600.589757][T23321] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 600.670984][T23321] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:11 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\b \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x4000840) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"/1133], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x113, 0x0, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0x4a, 0xffffff0c}, 0x40) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) 04:10:11 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:11 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:12 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) [ 601.091893][T23336] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00` \x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 601.160903][T23336] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:12 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:12 executing program 0: r0 = socket$kcm(0x2b, 0x0, 0x0) recvmsg(r0, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0x0}, 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x2, &(0x7f0000000080)=ANY=[@ANYRESOCT=0x0], 0x0, 0x6, 0x0, 0x0, 0x41000, 0x0, [], r1, 0x14, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r2, &(0x7f0000000000)="a1f7ddb43411c7b25a3bcf78f92bcdbc255d6466677dba88e04d75db3fc9d5a60d", &(0x7f0000000140)=""/79, 0x4}, 0x20) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) socket$kcm(0x29, 0x7, 0x0) 04:10:12 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:10:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00%\x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 601.631303][T23364] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:12 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) [ 601.717372][T23364] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00/\x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:12 executing program 0: r0 = socket$kcm(0x2, 0x8000000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000140)="b13c0e79534bfe560bfdd5101ac1d49e61d26a95d0a0a903bf02a57a03c5442c7d7ddf36a921f7d88212975b57b850781c45282996897c9d9b311333b629669aa7f62cbb264e6d0fefaed2c90f2217d848052cce65d6293a5988af1eee9d8dc3bf7f848057d99584ae269d40244529286ce55a9a3db712079a59651649cca329eeb3fb7de6b4eeb658a5b38d55da81890fb4ec9562f87070e7728fe748e334ed0693a70a8d57a538", 0xa8}, {&(0x7f0000000200)="110251ed8680e6eb1b595204d3029bc4fd2b87dc18ae14b0a89fb789052ee15002b99a4239c0f07210890085192af32f76569464552fed1f5ad3540c5fddcd3df10c98b4307a142818669634ed4771a0", 0x50}], 0x2}, 0x20000000) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) [ 602.091947][T23378] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:13 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x0e\xc0\x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 602.172589][T23380] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 04:10:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = getpid() sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000200)=@isdn={0x22, 0x0, 0x5, 0xb, 0xaa}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="8d5de2686e918e515b2a82b1279a7bf208b71b55ea70dcd33b354fe3f9f4f07e70a39a94f212b7d8e00462bef511d0370d132408e02a58d5e54064705bb3b4250d8c6ffb52b2b142a5e4a85eeab2a0872341afa2243f5717f282452d547dd7e091076525f5b78a40fd119e245cb99c678f8b9fc70a9352ebbfe344136f5674302875a1f60e3d9e16d69ba5f69b0a7ca4fd5963ae82ab2d38178c2944bd62c475d8d5dad41ad0d340fc5591fd855355ee527885e557ab114e66fccd6f6313c102e715167eb1e027533696700196f807ac303840c8afe84eba45226a0c5ae0ad049f612bd14c980652", 0xe8}, {&(0x7f00000000c0)="4a49d4282f8dad283fc2cf9242e917aa81b828", 0x13}], 0x2, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x138}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r1, 0xd, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x400, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000002c80), 0x7}, 0x12485, 0x7ffd, 0x0, 0x2}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) r4 = getpid() r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r4, 0xd, r5, 0x0) r6 = perf_event_open$cgroup(&(0x7f0000000480)={0x4, 0x70, 0x3, 0x16, 0x7f, 0x0, 0x0, 0x3, 0x20901, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000003c0), 0x2}, 0x4000, 0x5, 0x401, 0x5, 0xfffffffeffffffff, 0xbb, 0x2}, r5, 0x8, r2, 0xd) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000500)={0x0, 0x70, 0x6, 0x81, 0x7f, 0x3, 0x0, 0x7fffffff, 0x2106, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000400)}, 0x40002, 0x1, 0x7f, 0x3, 0x2, 0x6, 0x6}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000100)="1f000000190081ace4051cecff091ffa1c6799a61cfe7084bce26a23480b0e", 0x1f}], 0x1}, 0x0) 04:10:13 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:13 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00\xff\x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:13 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00%\x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:14 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x0, 0x2, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x104, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="18020000000008009ad3a5bbe11d39519500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00/\x00\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:14 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00\xc0\x0e\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x02\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:14 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:15 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) getpid() socket$kcm(0x29, 0x2, 0x0) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r2, 0xd, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x03\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:15 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x04\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) getpid() socket$kcm(0x29, 0x2, 0x0) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r2, 0xd, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:16 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x05\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:16 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x06\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) getpid() socket$kcm(0x29, 0x2, 0x0) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r2, 0xd, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r6, 0x800454cf, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40305839, &(0x7f0000000040)) close(r7) r8 = perf_event_open$cgroup(&(0x7f0000000240)={0x1, 0x70, 0x1, 0x80, 0x7, 0x5, 0x0, 0x1, 0x2040, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x800, 0x8, 0xfe0, 0x3, 0x5}, 0xffffffffffffffff, 0xb, r7, 0x4) r9 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0x1, 0x80, 0x8, 0x40, 0x0, 0x2, 0x2002, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x1010, 0x3, 0x4, 0x3, 0x0, 0x7fff, 0xd8}, r3, 0xb, r4, 0x0) openat$cgroup_int(r5, &(0x7f0000000380)='memory.low\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r8, 0x2405, r9) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:16 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \a\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:17 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \b\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:17 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r8, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r7}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r11 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r11, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r11, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r12, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r11, 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r13, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 `\x00\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:17 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:17 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x03\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:18 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:10:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x05\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) getpid() socket$kcm(0x29, 0x2, 0x0) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r2, 0xd, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:18 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x06\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:18 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:18 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\a\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:19 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:10:19 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00?\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:19 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:19 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00@\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:19 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:20 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00`\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:20 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:20 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\xff\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, r3, 0xd, r4, 0x0) openat$cgroup_ro(r4, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETFEATURES(r5, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:20 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:20 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 TL\xe9\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:20 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:10:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\x01\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:21 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305839, &(0x7f0000000040)) close(r8) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\x02\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:21 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:21 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:21 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\x03\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:21 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\x04\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:22 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:22 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\x05\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:22 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:22 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:22 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\x06\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:23 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:10:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\a\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:23 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\b\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0xd, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:24 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:24 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00?\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:24 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00@\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) [ 613.876142][ T208] unregister_netdevice: waiting for lo to become free. Usage count = 4 04:10:24 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:25 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0xd, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\xe9LT\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:25 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00`\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:25 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:25 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \xff\xff\xff\xc3\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:26 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = getpid() perf_event_open(0x0, r3, 0xd, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \xff\xff\xfd\xfd\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:26 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:26 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:26 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \xff\xff\xff\xfe\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x00\x00\xff\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:27 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \xfd\xfd\xff\xff\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:27 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xd, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:27 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:27 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:27 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:10:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \xc3\xff\xff\xff\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:28 executing program 0: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \xfe\xff\xff\xff\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:28 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x02\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:28 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008b80)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r12, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='cgroup.controllers\x00', 0x0, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(r13, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) recvmsg(r12, 0x0, 0x0) r14 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_procs(r14, 0x0, 0x2, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) socket$kcm(0x29, 0x0, 0x0) 04:10:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000040)) close(0xffffffffffffffff) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r9}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:28 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="180200000000080000000000000008009500000000000000"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x10) r2 = getpid() socket$kcm(0x29, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xd, r3, 0x0) openat$cgroup_ro(r3, &(0x7f0000000100)='io.stat\x00', 0x26e1, 0x0) perf_event_open(0x0, r2, 0xb, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000940), 0x12) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x400c00) ioctl$TUNGETFEATURES(r4, 0x800454cf, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 04:10:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x03\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:29 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) 04:10:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8922, &(0x7f0000000740)='lo:\a\x00`\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xde\xa4\xc7\xc6\xe9LT\xa1X\x19\x9d\xf2\xb6\xd15\xa1\xb7\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00\x00\x00\x00\x00\x00M1\x94r>5\b\xdc^T\x14t\x1e\xea-0\x89\xe1\x8bp\xf5I\x01\x89\xc3\x01\'\x91|p>\x15P`(/\x95\xec\x05\xe2\xc7\x01\"-\xacJJG\\5\x8b\x8c\xf3\xf2\xea') socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8922, &(0x7f0000000280)='lo:\a\x00`\x00\x00 \x00\x04\x00\x00\x00\x88\xb5\x00\xe9LT\xa1X\x19\x9d\xf2\xb6\xd1\x02\xbb\xd6\xcf\a\xbc\x15\xcc>=\x06+\xc0\xf5\x8b\xa9p\x16W)\x00'/57) 04:10:29 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0xe561, 0xc}, 0xc) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280), 0xc) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r3 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r2, 0x161) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x161) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r6, &(0x7f0000000200), 0x400000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008740)={0x0, 0x0, &(0x7f0000008700)=[{0x0}, {&(0x7f00000086c0)=""/38, 0x26}], 0x2}, 0x8000) bpf$PROG_LOAD(0x5, &(0x7f0000008a40)={0xe, 0x15, &(0x7f0000000880)=ANY=[@ANYBLOB="18080000fffff7000000000005000000954f1865d146000000044ccdbc63b04f573105a8492a15fca950a3c8a47dbbf122ea9a41bb506c5c652f9a81e6895945df652bdf1ecba7d6de5716d008edfafa0f668162150ee75a15c32f7ccb63759c5528c04118f15a138947bdc52417b6a46c2b9d830aec9dba2166ba0415ab7ee310847ad9abf79dbb606464000000c732589dce8d9cfc5bd173f40202be158e81c5a23def970569d190"], 0x0, 0x0, 0x1, &(0x7f0000000240)=""/1, 0xf411ba420ec4be38, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000008780)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000087c0)={0x1, 0xc}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x161) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r7, 0x161) bpf$PROG_LOAD(0x5, &(0x7f000000fc80)={0x1, 0x15, &(0x7f0000000c80)=ANY=[@ANYBLOB="18", @ANYRES32=r0, @ANYBLOB="000000000000000018140000", @ANYRES32, @ANYBLOB="0000000000000000182b000064246c18c66862778103003eeb0080cb2a26fbdb49ce7b7988b4815144cd7caf1db60e4110ba546aca5a7f79904259b5bf4e523eba24ec9e6e0adb6ac9d77b91bd4cfc070000000000000043fed7802426709cc36ab81f50ba22f25f8e3536c2bb", @ANYBLOB="0000000001f8ffff302a30000100000007a98100ba74000085100000ffffffff18240000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x1, @ANYBLOB], 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40f00, 0x2, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, 0xfffffffffffffffd, 0x0, 0x10, &(0x7f000000fbc0)={0x2, 0xe, 0x5}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000b80)=""/199, 0xc7, 0x0}}, 0x10) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40305839, &(0x7f0000000040)) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xa, &(0x7f0000000580)=ANY=[@ANYBLOB="7386020000004145a605797d028bc114fb67f18c8e489e5fa87dbf0dfdfe11eaab1a206b31fdf33ee2d742c6f584cdad133318642d0cad492dd3ebd837756ed9ad5ca59dc18754809f07949e6bdfcaaba483"], &(0x7f0000000200)='syzkaller\x00', 0xfa1, 0x43, &(0x7f00000002c0)=""/67, 0x0, 0x2, [], 0x0, 0x0, r9, 0x8, &(0x7f0000000240)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0xffffffff, 0x5}, 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r10}, 0x7e) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x16, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0x0, 0x4, 0x7fffffff}, 0x10, 0xffffffffffffffff}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'vlan0\x00'}) socket$kcm(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x2f9, 0x300, &(0x7f0000000040)="b90103000000f000009e0ff008001fffffe100004000632177fbac141414e0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999058aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7"}, 0x28) 04:10:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3f, 0x0, 0x0, 0x3, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00