1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="66ae4b03e78a328d51c0950c1d28183ae0de91cff43a280fecfe7c37b326da7a89e102d52ef1c5856b94a7ac633e9c992b2f55c4282c4b1c0d0cc50a0644b5af63e585c24d073f44ebcfa24e80aa85cbfffa8b7cb98d3029a002bf4e3497981a164860287d6efa3be173e5abd4fca332e7ee4d", 0x73}], 0x1, 0x0, 0x0, 0xf00}, 0x77fff) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@cgroup, r0, 0xc}, 0x10) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x0, 0xe8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000140)=0x100000000800009) 23:09:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.stat\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001340)={0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffffffc1) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="66ae4b03e78a328d51c0950c1d28183ae0de91cff43a280fecfe7c37b326da7a89e102d52ef1c5856b94a7ac633e9c992b2f55c4282c4b1c0d0cc50a0644b5af63e585c24d073f44ebcfa24e80aa85cbfffa8b7cb98d3029a002bf4e3497981a164860287d6efa3be173e5abd4fca332e7ee4d", 0x73}], 0x1, 0x0, 0x0, 0xf00}, 0x77fff) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@cgroup, r0, 0xc}, 0x10) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x0, 0xe8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000140)=0x100000000800009) 23:09:14 executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x6, 0x7f, 0x0, 0x7, 0x0, 0x7, 0x20000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x81, 0x4, @perf_config_ext={0x3, 0x8}, 0x4320, 0x0, 0x6, 0x7, 0x0, 0x4010000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000100)=0x5, 0x12) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x24800000a, 0xa010a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x5}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, r0, 0x0) openat$cgroup_type(r1, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) write$cgroup_int(r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) r2 = perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x3, 0x0, 0x3f, 0x5, 0x0, 0x0, 0x2, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3db7, 0x0, @perf_config_ext={0x9, 0x1}, 0x9400, 0x0, 0x31, 0x3, 0x100000000000007, 0x20, 0x2}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0xfffffd5d, 0x0, 0x34, 0x6, 0x5, 0x0, 0x8, 0x429b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0xfffffffffffff800, 0xd}, 0x10, 0x6, 0x7, 0x7, 0x8, 0x7da, 0xfff7}, 0x0, 0x8, r2, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffff1f) 23:09:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x12) perf_event_open(&(0x7f00000025c0)={0x2, 0x70, 0x5d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x9) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) unlink(&(0x7f0000000080)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0x1) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000100)) 23:09:14 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.self_freezing\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) write$cgroup_int(r1, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'ipvlan1\x00', @random}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001700)='syz1\x00', 0x1ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x9, 0x12) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) sendmsg$tipc(r3, 0x0, 0x4000014) [ 160.987518][T10057] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 161.047976][T10057] team0: Device ipvlan0 failed to register rx_handler 23:09:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.stat\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001340)={0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xffffffffffffffc1) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x24000844) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000280)="66ae4b03e78a328d51c0950c1d28183ae0de91cff43a280fecfe7c37b326da7a89e102d52ef1c5856b94a7ac633e9c992b2f55c4282c4b1c0d0cc50a0644b5af63e585c24d073f44ebcfa24e80aa85cbfffa8b7cb98d3029a002bf4e3497981a164860287d6efa3be173e5abd4fca332e7ee4d", 0x73}], 0x1, 0x0, 0x0, 0xf00}, 0x77fff) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={@cgroup, r0, 0xc}, 0x10) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x0, 0xe8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000140)=0x100000000800009) 23:09:15 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x12) perf_event_open(&(0x7f00000025c0)={0x2, 0x70, 0x5d, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x9) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) unlink(&(0x7f0000000080)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0x1) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000100)) 23:09:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x25, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000003c0), 0x12) recvmsg$kcm(r1, &(0x7f000000f380)={&(0x7f000000f140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000f300)=[{&(0x7f000000f1c0)=""/26, 0x1a}, {&(0x7f000000f200)=""/11, 0xb}, {&(0x7f000000f240)=""/179, 0xb3}], 0x3, &(0x7f000000f340)=""/21, 0x15}, 0x2001) sendmsg$kcm(r1, &(0x7f0000010bc0)={&(0x7f000000f3c0)=@can={0x1d, r2}, 0x80, &(0x7f000000f880)=[{&(0x7f000000f640)="38a4ed66057ae4758de13155ecc9904a4b81a76eb83c15cf1ff4341004cdda5fed6e5dbc736fbcc18bb8ed163708b842a5d6fe5ee84bdd08ccc52363d45c91932b87314c942585eb95ac265379c40a017e756ed1a165b0813fd144", 0x5b}, {&(0x7f000000f7c0)}], 0x2, &(0x7f000000f900)=[{0x50, 0x114, 0x0, "5af2612dd0597d3992d9e821260977cd4272e52b7b1a3484081421840b1a152d4882934a05cf3c140f700ae015643d01287841501dd29111fc6093210a03"}, {0x10, 0x0, 0x3}, {0xf8, 0x0, 0x4, "55481c6b24534aad627aaa300b46b3af91e80c7292466463347ca6d8b9fd3409a984e74c6840981698fd9b14ac0a178cfecf23e18783ab6886fb701acefb02192dc082e86a4752d04335e39cffce5edcd338f6ab4849f442d113ca526f378fdd4598e0324ec6320cb549ec98b3f940bdfaf01d970662049056eaada4646b0d8f82159fae2ae766e24d58adc2ac1ced4d3e3751d8fc1d1bf99985ffa8c727bdddb074474d92ed824ed67da3c092db0c78fe098f914deda998fc95cea09a147c3a87a1bc15701acba27576f0cde2e3c74ed2398246910d7fd852a3c49caee09cef45d3"}, {0xef0, 0x0, 0x0, "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"}], 0x1048}, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000600)=@xdp={0x2c, 0x0, r2, 0x2a}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000680)="1c35f9c90d3c21f1d4e4f9c17dcaa05afd835c57d12c61c031a790670e02b2cab09e7f53600dff7e", 0x28}, {&(0x7f0000000740)="ba422b02e36955bbb80a8af441ec94850ba079ceb8560838363fcb3606b9f7c102594bb8f3776ad6500c7f4bf23af394aae5ab33921edf8b155f49d8f48fb70beb82bf1b85be921f095eced29b641acfad63a29c15f146c95a1e50814c9ef3bc43b1ed4b515493a5d3df46d16d73c30d6cf220d6c30b5406ba1f0312c6679580d1c3dbe65bbb24a79c6bbdb074567349aae028f6887177ffdaee32e2bb1ba01f900cef62999d2878beea1d1ca3b1b50aea7b984d685bc6bd36c4750d36b6a9b615038f2bea3bfb5d0c1b6f860c7134d584ee2e64bc954bc4cfd9bdf29f52d9c4d54c6583cf3ca9ce378a9f7848f93ce6084b1d317c66", 0xf6}, {&(0x7f0000000840)="52050b181696fc25548d93b887a6ce649c2f74c0ebc1b3773417e877b216efb028104721c6e5a8a00a28933347d28e1eebd97e15777422c8747540668f2a5dc0de5dd73e15df8e9e3519d7a49f3b81b060eb8e68d239ab39985c6b1db26d3febdc2232a10691b6d0da7f801e4cce09cf9915236793300ba3ccd67a3ffecf18e59cea8c810e62c5fbd78c04dcf9641fe6fe24b7c7e2f599591a969de7735019bccb560945096998bfa33bfadee03791aac3a3b6a81679", 0xb6}, {&(0x7f0000000900)="8be3a68a60130feefdb1a6f5cd4d460538281e144f27b4a13824b1dcb581e7e2311bdb6fd56e3eb367ef7ea2c9a127b98fd9fd0ec4126f8bdb1efbb590bdd28319e000b35b6fae10776115210909b5ba1e4f537692935d6b77aeaab1d724318540ca5990e81968925b780e7c181ae438076780a957ec95f69df5b4650dcbd1b6ea51af68409c9b5a0cca52f97135a09314d03ee9ec812fed401e09e6a6479ca0e8e388431f8ee2bd5f69ce78c8f3ed649a40d5736e254975d0", 0xb9}, {&(0x7f00000009c0)="8b9d5749a837d7268405489acf1cdd5f553365ee84c9f2aad41f2465e7ddc674a30caba70a1f23bc847a7f2fd618467feee11c18361c", 0x36}, {&(0x7f0000000a00)="59788b9ef16e5fd916fb624050ec25aa92affb45ef559cd3bc903704dc38392f34f356bf6b246a033a4067dbfc33731a0947b7b3ff8b465c8745c2c88cd6ff1771dafb63db46f1eb738250af184b750e9f01a16d97399cd421c9c2e6b27d292c195acb2c1a12cb2bf3854d0886aa1934c958d279ad655367ec27c0b12b0555edf535d71967ea42529c08129dc3fdcb6d27c6", 0x92}, {&(0x7f0000000ac0)="488d29e2173739b98d593778273ad355c48fe07a80bec49136ed3da2d335f858349fe2cc9b2934a06a2e12832a11311f548f2b4028054d12f3eb621e", 0x3c}], 0x7}, 0xc810) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffa888, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d0000000b101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f00000004c0)={&(0x7f0000000200)=@ethernet={0x1, @random="d0ca2db84e49"}, 0x80, &(0x7f0000000440)=[{&(0x7f00000003c0)="874b4656906986dcf9ef432401b9e70455a2e830a0fa7c79f0aa84d4bdbe7fda223415f382b3ab3ae10cd4f852b1036ef0613df931d7177ffb686b63504a146d7af95a034f729c3df0353e271618a03fd00152780b", 0x55}, {&(0x7f0000000280)="26dd2cba1fa130b294a88c2b65019b", 0xf}], 0x2, &(0x7f0000000540)=[{0xc0, 0x103, 0x6, "6855e0f52eb084b1405d971435f0c30c92b6b9155b94cdb36111307400465cd7518d9128829df20b896c06f40d076736970bb1da93452434be47879758e1e73cf0e340a07cd06d71372e40bb86a4483aea29c238b1cf14ce7bcc01973295c918622d303ff6b4eb9d50431a5247fd3592ba5cd050f33959bc3e2aca3132784b85fd27cdf857b6caba8be85b94ec68b3c9688c7629f3c4aceaf38d44a36e8513cc4b5e37e155774ce5e02caa"}], 0xc0}, 0x840) socketpair(0x11, 0x0, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x19, 0x6, 0x0, &(0x7f00000000c0)='GPL\x00', 0x86, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3}, 0x10}, 0x78) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x810000, 0x0, 0x0, 0x0, 0x19, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r5}, 0x78) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 23:09:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0x410, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040)}, 0x40800, 0x9, 0x10001, 0x9, 0x2, 0x5, 0xffff}, 0xffffffffffffffff, 0x7, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1000) close(0xffffffffffffffff) [ 162.232072][T10057] syz-executor.3 (10057) used greatest stack depth: 23080 bytes left [ 162.241904][T10069] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 162.400275][T10069] team0: Device ipvlan0 failed to register rx_handler 23:09:16 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="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"/771], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x440}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000400)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x40000000}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000480)="600f170ef92d9871ae76bd67549243282e78d6361b873e808ace13fd5331a1f2539759d6a56f7af0f5e4187d77ea5a1ffdafefb866791de1deeca1df26c62b8dce2a35ac186a15964b78dc0b1aa68366306dfda9fff23b5a3f96473d190e1b4f539b5ddb4c80ffe43a741eef0ace4fec4ea61805a2b6c503078944d7ed8e96b33573211e69e6dd24708601d8323b682ee954f42c75f8e3bca338b7181a29e705b8bb964966715fde8bf08f0aa616811aef0d8c5a9118bfe8c28f66aaf7b780af8beb4377850484a69449448443", 0xcd}], 0x1, &(0x7f0000000c40)=ANY=[@ANYBLOB="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"/1640], 0x668}, 0x8040) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x9, 0x1, 0x8, 0x20, 0x0, 0x3, 0x8, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x1, @perf_config_ext={0xaf, 0x20}, 0x800, 0x0, 0x101, 0x1, 0x10001, 0x0, 0x2}, 0xffffffffffffffff, 0xc, r1, 0x8) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = socket$kcm(0x29, 0x0, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) sendmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="2e00000021008103e00f80ecdb4cb9020200000400000001810040fb120018000e0f040f40d819a906000500020f", 0x2e}], 0x1, 0x0, 0x0, 0x10}, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000001840)={r5}) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 23:09:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@id={0x1e, 0x3, 0x1, {0x4e21, 0x3}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000340)="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", 0xfa}], 0x1, 0x0, 0x0, 0x4008000}, 0x8000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380)}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="1100000000000000004003000100000000009bf7000000001c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000044100900000000000000000000007e000000000011000000000000000000001f000000"], 0x98}, 0x0) 23:09:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$tipc(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@id={0x1e, 0x3, 0x1, {0x4e21, 0x3}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000340)="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", 0xfa}], 0x1, 0x0, 0x0, 0x4008000}, 0x8000) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$inet(r1, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @rand_addr=0x20}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000380)}], 0x1, &(0x7f0000007880)=ANY=[@ANYBLOB="1100000000000000004003000100000000009bf7000000001c00000000000000000000fd08000000", @ANYRES32=0x0, @ANYBLOB="ac1414bbe0000001000000001c00000000000000090000000888f800", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000240000000000000000000000070000009404000044100900000000000000000000007e000000000011000000000000000000001f000000"], 0x98}, 0x0) 23:09:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) [ 163.819152][T10087] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.827247][T10087] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.868943][T10087] device bridge0 entered promiscuous mode [ 164.096573][T10089] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. [ 164.106727][T10089] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.115099][T10089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.122743][T10089] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.129959][T10089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.169032][T10069] syz-executor.1 (10069) used greatest stack depth: 22416 bytes left [ 164.254157][T10099] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.261454][T10099] bridge0: port 1(bridge_slave_0) entered disabled state 23:09:18 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.self_freezing\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) write$cgroup_int(r1, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'ipvlan1\x00', @random}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001700)='syz1\x00', 0x1ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x9, 0x12) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) sendmsg$tipc(r3, 0x0, 0x4000014) 23:09:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0x410, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040)}, 0x40800, 0x9, 0x10001, 0x9, 0x2, 0x5, 0xffff}, 0xffffffffffffffff, 0x7, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1000) close(0xffffffffffffffff) [ 164.627153][T10116] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 164.646759][T10116] team0: Device ipvlan0 failed to register rx_handler 23:09:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x25, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e000100240248ff050005001201", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f00000003c0), 0x12) recvmsg$kcm(r1, &(0x7f000000f380)={&(0x7f000000f140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000f300)=[{&(0x7f000000f1c0)=""/26, 0x1a}, {&(0x7f000000f200)=""/11, 0xb}, {&(0x7f000000f240)=""/179, 0xb3}], 0x3, &(0x7f000000f340)=""/21, 0x15}, 0x2001) sendmsg$kcm(r1, &(0x7f0000010bc0)={&(0x7f000000f3c0)=@can={0x1d, r2}, 0x80, &(0x7f000000f880)=[{&(0x7f000000f640)="38a4ed66057ae4758de13155ecc9904a4b81a76eb83c15cf1ff4341004cdda5fed6e5dbc736fbcc18bb8ed163708b842a5d6fe5ee84bdd08ccc52363d45c91932b87314c942585eb95ac265379c40a017e756ed1a165b0813fd144", 0x5b}, {&(0x7f000000f7c0)}], 0x2, &(0x7f000000f900)=[{0x50, 0x114, 0x0, "5af2612dd0597d3992d9e821260977cd4272e52b7b1a3484081421840b1a152d4882934a05cf3c140f700ae015643d01287841501dd29111fc6093210a03"}, {0x10, 0x0, 0x3}, {0xf8, 0x0, 0x4, "55481c6b24534aad627aaa300b46b3af91e80c7292466463347ca6d8b9fd3409a984e74c6840981698fd9b14ac0a178cfecf23e18783ab6886fb701acefb02192dc082e86a4752d04335e39cffce5edcd338f6ab4849f442d113ca526f378fdd4598e0324ec6320cb549ec98b3f940bdfaf01d970662049056eaada4646b0d8f82159fae2ae766e24d58adc2ac1ced4d3e3751d8fc1d1bf99985ffa8c727bdddb074474d92ed824ed67da3c092db0c78fe098f914deda998fc95cea09a147c3a87a1bc15701acba27576f0cde2e3c74ed2398246910d7fd852a3c49caee09cef45d3"}, {0xef0, 0x0, 0x0, "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"}], 0x1048}, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000600)=@xdp={0x2c, 0x0, r2, 0x2a}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000680)="1c35f9c90d3c21f1d4e4f9c17dcaa05afd835c57d12c61c031a790670e02b2cab09e7f53600dff7e", 0x28}, {&(0x7f0000000740)="ba422b02e36955bbb80a8af441ec94850ba079ceb8560838363fcb3606b9f7c102594bb8f3776ad6500c7f4bf23af394aae5ab33921edf8b155f49d8f48fb70beb82bf1b85be921f095eced29b641acfad63a29c15f146c95a1e50814c9ef3bc43b1ed4b515493a5d3df46d16d73c30d6cf220d6c30b5406ba1f0312c6679580d1c3dbe65bbb24a79c6bbdb074567349aae028f6887177ffdaee32e2bb1ba01f900cef62999d2878beea1d1ca3b1b50aea7b984d685bc6bd36c4750d36b6a9b615038f2bea3bfb5d0c1b6f860c7134d584ee2e64bc954bc4cfd9bdf29f52d9c4d54c6583cf3ca9ce378a9f7848f93ce6084b1d317c66", 0xf6}, {&(0x7f0000000840)="52050b181696fc25548d93b887a6ce649c2f74c0ebc1b3773417e877b216efb028104721c6e5a8a00a28933347d28e1eebd97e15777422c8747540668f2a5dc0de5dd73e15df8e9e3519d7a49f3b81b060eb8e68d239ab39985c6b1db26d3febdc2232a10691b6d0da7f801e4cce09cf9915236793300ba3ccd67a3ffecf18e59cea8c810e62c5fbd78c04dcf9641fe6fe24b7c7e2f599591a969de7735019bccb560945096998bfa33bfadee03791aac3a3b6a81679", 0xb6}, {&(0x7f0000000900)="8be3a68a60130feefdb1a6f5cd4d460538281e144f27b4a13824b1dcb581e7e2311bdb6fd56e3eb367ef7ea2c9a127b98fd9fd0ec4126f8bdb1efbb590bdd28319e000b35b6fae10776115210909b5ba1e4f537692935d6b77aeaab1d724318540ca5990e81968925b780e7c181ae438076780a957ec95f69df5b4650dcbd1b6ea51af68409c9b5a0cca52f97135a09314d03ee9ec812fed401e09e6a6479ca0e8e388431f8ee2bd5f69ce78c8f3ed649a40d5736e254975d0", 0xb9}, {&(0x7f00000009c0)="8b9d5749a837d7268405489acf1cdd5f553365ee84c9f2aad41f2465e7ddc674a30caba70a1f23bc847a7f2fd618467feee11c18361c", 0x36}, {&(0x7f0000000a00)="59788b9ef16e5fd916fb624050ec25aa92affb45ef559cd3bc903704dc38392f34f356bf6b246a033a4067dbfc33731a0947b7b3ff8b465c8745c2c88cd6ff1771dafb63db46f1eb738250af184b750e9f01a16d97399cd421c9c2e6b27d292c195acb2c1a12cb2bf3854d0886aa1934c958d279ad655367ec27c0b12b0555edf535d71967ea42529c08129dc3fdcb6d27c6", 0x92}, {&(0x7f0000000ac0)="488d29e2173739b98d593778273ad355c48fe07a80bec49136ed3da2d335f858349fe2cc9b2934a06a2e12832a11311f548f2b4028054d12f3eb621e", 0x3c}], 0x7}, 0xc810) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffa888, &(0x7f0000000080)=[{&(0x7f00000002c0)="2500000010008108040f80ecdb4cb92e0a480e600d0000000b101e00010040d5ae7d0200ff", 0x25}], 0x1, 0x0, 0x0, 0x792e0000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r4, &(0x7f00000004c0)={&(0x7f0000000200)=@ethernet={0x1, @random="d0ca2db84e49"}, 0x80, &(0x7f0000000440)=[{&(0x7f00000003c0)="874b4656906986dcf9ef432401b9e70455a2e830a0fa7c79f0aa84d4bdbe7fda223415f382b3ab3ae10cd4f852b1036ef0613df931d7177ffb686b63504a146d7af95a034f729c3df0353e271618a03fd00152780b", 0x55}, {&(0x7f0000000280)="26dd2cba1fa130b294a88c2b65019b", 0xf}], 0x2, &(0x7f0000000540)=[{0xc0, 0x103, 0x6, "6855e0f52eb084b1405d971435f0c30c92b6b9155b94cdb36111307400465cd7518d9128829df20b896c06f40d076736970bb1da93452434be47879758e1e73cf0e340a07cd06d71372e40bb86a4483aea29c238b1cf14ce7bcc01973295c918622d303ff6b4eb9d50431a5247fd3592ba5cd050f33959bc3e2aca3132784b85fd27cdf857b6caba8be85b94ec68b3c9688c7629f3c4aceaf38d44a36e8513cc4b5e37e155774ce5e02caa"}], 0xc0}, 0x840) socketpair(0x11, 0x0, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x19, 0x6, 0x0, &(0x7f00000000c0)='GPL\x00', 0x86, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x3}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3}, 0x10}, 0x78) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x810000, 0x0, 0x0, 0x0, 0x19, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r5}, 0x78) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 23:09:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xd7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x3}, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000)='threaded\x00', 0x248800) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x76, 0x0, 0x0, 0x0, 0x0, 0x410, 0x5, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040)}, 0x40800, 0x9, 0x10001, 0x9, 0x2, 0x5, 0xffff}, 0xffffffffffffffff, 0x7, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1000) close(0xffffffffffffffff) [ 165.379784][T10145] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 165.417747][T10145] team0: Device ipvlan0 failed to register rx_handler 23:09:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:18 executing program 5: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.self_freezing\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) write$cgroup_int(r1, &(0x7f0000000180), 0x12) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000040)={'ipvlan1\x00', @random}) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xe43) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='threaded\x00', 0x9) bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000001700)='syz1\x00', 0x1ff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0x9) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xffffff9e, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480cf43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x9, 0x12) openat$tun(0xffffffffffffff9c, 0x0, 0x101000, 0x0) sendmsg$tipc(r3, 0x0, 0x4000014) 23:09:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) [ 166.713630][T10152] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.2'. [ 166.744028][T10152] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.751275][T10152] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.758771][T10152] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.765931][T10152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.782961][T10164] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:09:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) [ 167.012197][T10164] team0: Device ipvlan0 failed to register rx_handler 23:09:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) [ 167.957585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 23:09:21 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:21 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:21 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) [ 168.003367][T10164] syz-executor.5 (10164) used greatest stack depth: 22328 bytes left 23:09:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:22 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0xa8a0}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000001e008105e00f80ecdbc0b9f207c804a01e000000302e20000000a3030e000a0002000000da1b40d80589", 0x2e}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 23:09:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) [ 169.010865][T10232] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:09:22 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:22 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000500)="1298220e9fdfdb1841c759a940fbf863dfed85a95d3d4a31136d22dd7a9681a99c0b2128f16c00b66034f0c4e2d1c606bec4b2e1c70fa9c2c2ceec5d80d86ff88c4b2051439416cc6b9264fdbbc2cba70bae582de8132d445b367984b7fce35c8d1407686e9d62362fe6ac6122e94d0676cf5002b8df5012c773ac80db652491d264a0e299025e16630d5c381bf7ebf1997adb7afb97cf2dd3392a37ca040593e7e97eae446eeb9a1a81a581fcce6aa0a80ed6cd128542e09df3ab36c6ad2759e18bf2ae52b1dea17677d8bdec7222e9dfc72d3b663df10f9fdf419d69ca829a0e3da71638cb044938", 0xe9}, {&(0x7f0000000600)="eec99a3afa4d466eb3234fb98c921d49a0f89cf8ac063b0686634f839f87486c298d80efb4d8a05419631656536b3d5dfc2cdb0ab921195d15d6d5daba38696bcbd304b076384ca76a25f64b5123b29038bf3675d93b489d1f3b77fae0289b5efb1998ad1246", 0x66}, {&(0x7f00000000c0)}, {0x0}], 0x4, 0x0, 0x0, 0x20000001}, 0x40) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000400)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f00000018c0)=[{0x0}, {&(0x7f0000001780)="c28ca33ffda8c9fc6dc6da2072b0c04e7d1c2b39169aa418544c06d0c97115673fda4745f74eda884525d4179f05a2286538cd4082efe75da4a50fb25ff4c8b5edd3076bfe441e7ab4948b6d9f973f8f0ce4375b9b0c5a130874fd773ba5367193430b1bf243127525397a8cabde01bd15de3310defc748935c8fb0508ae1040140152e06f64888272e6c6588891752c6d8e23848eef923aeddabdc3d4197dc6ce57e2a8a643ded26691d8db70e0abeb132e392d3e2647fae51670f0420d6f5d5893f7e6d9a0a5b46aabfff2a0ec7628891ccd5551ec492cecf96d91a22077bc", 0xe0}, {&(0x7f0000000440)="7d588d7eb976ecac83b90d9f7076", 0xe}, {&(0x7f0000000480)='C', 0x1}, {0x0}], 0x5, &(0x7f0000001a00)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0x48}, 0x48021) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000051c0)={&(0x7f0000001b00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000050c0)=[{&(0x7f0000001b80)=""/231, 0xe7}, {0x0}, {&(0x7f0000002c80)=""/242, 0xf2}, {&(0x7f0000002d80)=""/199, 0xc7}, {0x0}, {&(0x7f0000001980)=""/37, 0x25}, {&(0x7f0000004fc0)=""/206, 0xce}], 0x7, &(0x7f0000005180)=""/46, 0x2e}, 0x40000002) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="780000000000000004010000fd0f0000e90440fcfdd9eda1b95a5ca2edbb7ade25945220e57842532190c9e89d722f03706f72a518a90c21ca11180d6c2de4b36dcc250c512a553f52765c8876004cc04596cd96d147a27a610490076b998a7ce8cc54caa89f8c90f5de45d000000000000068a25ddf4db83819daf5ca5fda9a311abfb6f90a44f86969b3622cf8af0000000000000040e2f9922e3d8821fde4d04ac7e53bddf5c09b000eac8f162c171661d72669f069a1ef795608211f345a43fe069470b37be02513cc0455bfda24cd62eb3d9ae0916ab6091643651f027b027d9a4dbaa6b07bab552ac09852bb175236be0a6b074642292052f60640286d27481a907696aa929b8c870fcfbcaa132dae0c93011bb0a50542dafc58f70197870c53a585625e60c202833ffd0000000000000000000000965e9289fe4cccedb5b0cba9b922d38bac665b"], 0x150}, 0x20000000) r2 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x204, 0x0, 0x0, 0x0, 0x44}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a80)={0x3, 0x70, 0x0, 0x1, 0x1f, 0x6, 0x0, 0x0, 0x88, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001940), 0x4}, 0x0, 0x5, 0x7fffffff, 0x0, 0x20, 0x2, 0x8000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0xa, 0x70, 0x80, 0x4, 0x81, 0x1f, 0x0, 0x0, 0x20, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x1ff, 0x7}, 0x8000, 0x0, 0x8, 0x9, 0x3, 0x3, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r4 = gettid() r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x2500, 0x2, 0xe343, 0x0, 0x40000000}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0xaf, 0x0, 0xe4, 0x0, 0x3, 0x10000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4086, 0x2, @perf_config_ext, 0x0, 0xed, 0x4, 0x2, 0x0, 0x1, 0x4}, r4, 0x8, r5, 0x8) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x9, 0x1, 0x5, 0x0, 0xfff, 0xd2000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x5, 0x3, 0x4, 0x100000001, 0x0, 0x3}, r4, 0xc, r1, 0xa) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 169.095788][T10233] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:09:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$inet(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f00000024c0)=[{&(0x7f0000000200)='Q', 0x1}], 0x1}, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f00000002c0)={&(0x7f0000000080)=@isdn={0x22, 0xb9, 0x5, 0x7, 0x9}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)}, {&(0x7f0000000180)="f5d4423cde72913315c83e3a2625f4e4bbc062a841a7fb31961c4532eb2a096492dcf1ade09acf59d65a0d6f0f150e59861d7220", 0x34}], 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="68000000000000000d010000710f00001c05ec136475373cfcd7247a9408fe66e9875a6605140280c962be85577b0ff0091ee3b12eb7806baf6483acd9b75103d678da6436113027ef1679c0ca4b19b791cb89c11e51cded87d1d700f1eb922e2905d67b0000"], 0x68}, 0xc1) 23:09:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:23 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:23 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x1ff) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f00000001c0)='\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r2, 0x28, &(0x7f0000000280)}, 0x10) write$cgroup_int(r1, &(0x7f0000000180), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x5, &(0x7f0000000140)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x27}, [@map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7fff}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) 23:09:23 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x10000000}, r2, 0x0, r3, 0x0) sendmsg$tipc(r1, 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000940)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000001600)={&(0x7f0000000980)=@hci={0x1f, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000a00)="30fe11cc6cb8f5989300086b6e7ae181e0b6a2dc5fafff2719d43d3105a9e5af89ab17bd4b8ef98306b863a45815aeb27b1dda55a58c3dde3d3c07587cd310e01872f9bd76279bf941e86a90f72b8a1bd44ecf58dc8c9bdac32ca89dc79709b3e4795598ec9ad2c2ddddb2a270e4f1d94bfb6630183a6de8c9e5899e9be876cd9995359f0d17", 0x86}, {&(0x7f0000000ac0)="9b0d4be4a2090cc31352dcf48e3153487b168589409c6da90f782f6dcdbb4ad8f814eb50715737d0b0e392d18c45bf464ffdfdec6bde058622b1bbab6dd4459d37823ea0460c9aed9fe22ba807f2deec1ff23ad38cb8b373188c14b959c73ded03f407fedd76849d6df39ab1ba8521c07713fce1fc0bd9b90c650c31a4eeaf2776", 0x81}, {&(0x7f0000000b80)="a8b51d93dba61bec8f7479121230de83b5facf63fccfd8f8ba299281925fdb237309bfc6850d570e37b3a316b5b3a894adb1826e0c55df32ddc56d133092c7c3a13d131a58dad5b9a99bb603889f1d8f8371e7a21a1197e5b28cb24b9e280c790d88f52766ca05b13710e062de7f1f3aa980c5fa15be4de39663990224b1b5b9aeb3a2c11ee33d26b7313c92d96e87f849f671f9ebd40308f9e31e497d5230ec7483ee09b22216f36b9829719f4bfd2799ff801ae8e81c4c5ee57d", 0xbb}, {&(0x7f0000000c40)="d053b0fabf8007e0754ce25b12e7716c7a96d5e5ef6689c916cb133505621630245a281be3f39c1ed927ad452a5c3c5eb1fa29e255b045edd07730643ac4b1992ce1754e8df760e795f78bc0f64425f9b9deaf4fb75fd59f25cbabedb1aeec7cee1e6d3525f6dd76532cc883e210b82d1d1c1b731f68b8fff0b6abf2e21d427ad255173359f8f67407", 0x89}, {&(0x7f0000000d00)="1782e40e74083d286d122c25468dae412eb60bf30e987005519d45f67047e5daa58689cf2db65ebd12a03e241593abbb1699c583d735e85cfce3d56a64d92074a1d50a7c2e88ca8ecc14bbdc5965c1b17224fd6966b28364cbc0c844b090a3d3a74bf11b1ac8f62767685f4a0eb1c52d76062441bce218724a7c81180056b947af63c10c25b9c97e9355b5a6ee8d54abdcadf5bc501da0e2a903b865bda4fc677e80799bba64f695c5f36ccb8ba6e3f71e237127ae235160b30693d7be5dbcefaa89c2af8697bf7bd5b0a91b9303ccd05e2dc76399ffeb493d574100482cbd8ad9d0a12650", 0xe5}, {&(0x7f0000000e00)="a93e83f22fadf40671e504c02cfb939f108d5c52b1aa3bccb25a313e5ccf61f1ed", 0x21}, {&(0x7f0000000e40)="a6ab12", 0x3}, {&(0x7f0000000e80)="fe9cca1dbd5bbb49b84811d601285341e7ea77c39340684e6c1eef2b70775b38e665f3a1bf1d8497ae96324d464fd1cc4d6e1785e76aca0938b59c429f8d88d268d140d0c6dda925ef9096030077b5fbc41bf9e9246a07e5d16029631c551f4573fe942851eb4fce3264fc46c1a68f5585437b6563de6d5f3acefc96ba5349d31477c5d36c6c40b238f3cda5be", 0x8d}], 0x8, &(0x7f0000000fc0)=[{0xd0, 0x110, 0x7, "6db6881bb0fcd3a9882ee7e49f771582bef63f0c69bd6e6f4f4823d27b9beeb0231d4339281713930236927ffbdd911f68755edfb8cf9941fa6fe5daafc62058cc5b62c2ecf001c5807996ba14455c5c19dcf21f62ad43b6ba55dde850557a2dc9e10f759163f45d1fd11defe94d4df4fb316c08023287b77a796d75ba91e9de13bdc3b3d740bed609e5f9b83746c4c04ab7af5388136503810f15df863c979e4cdd3f296c134720c42fb94063c07d40daaa27b7106ce0ddda7ef8"}, {0xe8, 0x104, 0xffffff81, "b469ef76084cdb42a70f3dc2dba915a1b4f3e5638c8df248f7a701d83f55d85d7964c25fc143ca9ea81c0b5c29535043008f613980fb8e92588e5631b53b1f822f38feded1a4d9884c118a2f67a217ed717e564f4cfec224338424b6128dff2a5167bb6e4ffdb3ef07dd64f29ce924394cccb525d4b1847fadbc203b8dae8cea5f9a528fde672cdefdc9c2e143658bbc29770e5bae8011e703fcd41042d4d5f2da0cb690efe42d398a86d1baff53127af4df4df3a09369e1f7c702ca36c99520b766c2aacdfc92310bd1479d8378670f51df"}, {0xa0, 0x10e, 0x80000000, "d392ff14af266ce38f494988aaf2839d52a3f02620a6a6c1c323ecec6734450e08abfb98d9b47da91e5c0b1f6d987116ab669647aa58c4756aca6e178699fac10e094374106afb3a2425963ef6d3a58dc4efe260ce8c68faf966e048aa932e91259013c66d0b5e708b249659060b2c7957186b54a305c4a30403ec6866aa75daa0ab15c36aa51d7f62be6af42a"}, {0xc0, 0x101, 0x9, "86c130aec6b160e90cb938f5d80da451256c4d5ef2a92b428472ab2e24b6239a9585e573dd160f14ea115badd3c403cfde43083dceb143243afdde322bde955156cebff9d213e715b1865e48d032b2d15656a7ba9acf0a8f909d417270ee545e8d6e94338d853de788e79a1ae7521651d1605e20cd7c438ee7dcfdff7ce610582a59fd3b5577fa71750e150af3f4b6be5458f56966ccc58325680e944566873219cfd244d82fecb44b8fffe19e8935b5"}, {0x70, 0x102, 0x7, "5397a692d97003d56762e7ecae881f9ba1324de63bd31108ffba000f6e000f0cfb5ee1a9a5a969da8834cc1c4c0b825bcaac529fe5ab122a2a42548b7c559efb26f63310c85a656bcd6a09e5f54adf5214086c982874cd911d"}, {0x100, 0x0, 0x100000, "66a0fddf7b9d029a112b5b7b82517dd3fd3f6fab1fb44c15f40381934160a8ac96e8365302f91bcacddb948cf56c2d2fdfcd9c2ebbc15ce3f64c33e266ac33fa54b15f8e7692346827b9692ae32c1fda9dcc52284f4fd7991941675f9643489bf83a1a4ea571a0f4a26f1e9a9e6dece4a9209bdefc13fd8f68f1ef51c201b69d5cd5ad8656232b32fcec7deae812db91d7989203616c56bd3f3e3d945131f69bd67ea3f5403da39b80f2c4a4c77fc07a35db23f9adc7ebff39909eaf3f4147f4100927bf783c44c908ba6998e8c07807ff05b1c8d773fa4a7882e2522cb38f21bd6a54c398c325046294c0c9af652130"}, {0xe8, 0x117, 0x3, "d7aaaedf7d0365ff09bc77254beb27a60827e67951297c8b3656e587ca7cf12a97af1e871520d8002bd811ca2927b69f1944fde77d270e55522b7eb606b49c486c48d21e3ab7fb90535d5f69870e43df59ed1a5c84409ea5d6cbdbd584dd94693ddcd51150d5fe3761d70dc32ceda82d2c78ba44170c9ec8185d56e33f5137c7aa1c78d099ca79fb76699ef6e510767ea376b00bd1e84f2e2b032e11befb3d8c7d1a2b5a83c9e63625009794fadbfa27c6252e6c1948b2284f0353600b20df0fdaa1a2c7fba78a8e067cf6e91d63faab05acc44935"}, {0xa0, 0x117, 0x6, "8cdfd2a77d05df8f321f819a1b4c29362dcd72520e51185672ec712ea77086caf2ac191d460cb409c8393300be265fa556f4734be02c633e381012bc32255b5a28b51422445bfacf25f410df1a54e6c8fcadf279cad9b50684125503541eb4a40b3e156bf41a8eef69babef9e8bfeba9e628be5cda8ad3e06f5de57bb96b9d03a458c7e0d44debe09c855269de6f96"}], 0x610}, 0x800) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x45, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000380)}, 0x1013, 0x0, 0xfffffffb}, 0x0, 0x0, r0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) 23:09:23 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x37, &(0x7f0000000200)=r0, 0x2e8) socketpair(0x11, 0x2, 0x0, &(0x7f0000000000)) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0x0, @mcast1}, 0x80, 0x0}, 0x0) unlink(&(0x7f0000000040)='./file0\x00') r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) sendmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)}, {&(0x7f0000000240)="92af50463420b2b4e8f3702d57a67c930f0fac62329e0662ae9015dbeb5a2eeda4c0cd535c0e1a1fadad37d4ed47c8eee282771069d20d6ffc85c39568a0c0966bb5f9d1f3ca1becaae59bc5c9ca5f4a4a7cea671b2709d782e86afd04a7f46792", 0x61}, {&(0x7f00000002c0)="0ab7b0789f6417ad3becf3d392c1c0e1d5813d6787bfd93ee43410c54a066e36d963977aaae4ddc4634b7b29dada2670c762accb5b9fcb3405cf1fbf02d8b58dbaf53e24f423ec7e8d7b4bdb2628c3bf91e9bcc3605489546c8b779511f926298035fc56863eea0df5ac4d2eb4ed9b1e45c2e09882b9f1de7bd7f33c8b56b54ba25df1f35d7eed533a0afb46684a619b5db12b51e83dea3a168cd1f65014c472d30bc62ec001d94890f71e6b68173a92b90a2b93de0c43ffe974976cef0b5459531522b0433480092982d5b7ff069d8d5e3fbf7965f1dd02c4774567275f2db282d0c3cc3608823d72e40a8302d8c68bc5b90f51", 0xf4}, {&(0x7f00000003c0)="90fb907871079cf075b90118719cc718a238e784da207780fbd763f6b87e6d616f660f66460ecebbe072cfaa759ec6f568c4b0ef45c9a504a9abd4828224aa35b1d8409fb83644b7497528d0548bd5bc5fb2df48d367cf621f3a51f50d58f5e551f6116604fc1da1156a29d9793a8c7c18", 0x71}, {&(0x7f00000001c0)="b167", 0x2}], 0x5, &(0x7f00000004c0)=[{0x1010, 0x102, 0x8, "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"}, {0x90, 0x0, 0x6, "d2de1d7dd4facbbd655dc27993276d45c3a30b3e27299af9ceb5f4265a77dd18169ef47e34788df26a202b2b9d8be47495b38e38f21bac1bd2aabfa385f11a1d446f08ac52bace972efec9b92371270f7acecb37a931c2143598cbba07a5834a8f8ac1beaba5d3a9d81be2836d6aad3f976c2bbf49de993f65"}, {0xf8, 0x103, 0xda17, "b60367da2f1beed8991beb0b659fe657eb4a5b607e78f63d2c3d8159de242cfd0b6ff8e50aaa1c41d4dc16d8c8f57f65f229d3c8752e729d6041abb666436ffb47dacb69639afa85b7c62d7cbe76843b27f1d33c3a7fe39b42ecefc7d94fad6ee128f42c4a8089a39330f523662064bf6c90f801f0e47418846bb6d44786b46846fc1c45ee92c8423c1d64113cc454cba42f70c944843657800d004b294bd0cfe90e632d0667c403b06f379604bfaca7a883a2d7561ea00bcfc66bc349043b42c48ed8277057b015634eca44eedf168e8299101fd28bfb13fb48e76dd03c1390a129"}, {0x30, 0x187, 0xd04d, "f4c41dddcd127e313232b5b2cff2c03ce57b3ea988b17e73972a0e25"}, {0x88, 0x10f, 0x5, "c89692eea3f7088beed6e6ed364282ea21e45c72d039427a35e840b4b0620fdcfd9d291c1523b72b48bd5e10cb07ef8e9ff6d150764dcde01e464097dd1abcf0d7549ac3c9710a2948a4b21406ba0ec05516844cd358d57a3dbc882e55efbd63d30f72ba1b1a860aed24ee40b1506b4356e9c213"}], 0x1250}, 0x4000000) 23:09:23 executing program 5: socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x2}, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04000056008109e00f80ecdb4cb9f207c804a00d00c00e02002efb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:09:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:24 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000500)="1298220e9fdfdb1841c759a940fbf863dfed85a95d3d4a31136d22dd7a9681a99c0b2128f16c00b66034f0c4e2d1c606bec4b2e1c70fa9c2c2ceec5d80d86ff88c4b2051439416cc6b9264fdbbc2cba70bae582de8132d445b367984b7fce35c8d1407686e9d62362fe6ac6122e94d0676cf5002b8df5012c773ac80db652491d264a0e299025e16630d5c381bf7ebf1997adb7afb97cf2dd3392a37ca040593e7e97eae446eeb9a1a81a581fcce6aa0a80ed6cd128542e09df3ab36c6ad2759e18bf2ae52b1dea17677d8bdec7222e9dfc72d3b663df10f9fdf419d69ca829a0e3da71638cb044938", 0xe9}, {&(0x7f0000000600)="eec99a3afa4d466eb3234fb98c921d49a0f89cf8ac063b0686634f839f87486c298d80efb4d8a05419631656536b3d5dfc2cdb0ab921195d15d6d5daba38696bcbd304b076384ca76a25f64b5123b29038bf3675d93b489d1f3b77fae0289b5efb1998ad1246", 0x66}, {&(0x7f00000000c0)}, {0x0}], 0x4, 0x0, 0x0, 0x20000001}, 0x40) socketpair(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000400)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f00000018c0)=[{0x0}, {&(0x7f0000001780)="c28ca33ffda8c9fc6dc6da2072b0c04e7d1c2b39169aa418544c06d0c97115673fda4745f74eda884525d4179f05a2286538cd4082efe75da4a50fb25ff4c8b5edd3076bfe441e7ab4948b6d9f973f8f0ce4375b9b0c5a130874fd773ba5367193430b1bf243127525397a8cabde01bd15de3310defc748935c8fb0508ae1040140152e06f64888272e6c6588891752c6d8e23848eef923aeddabdc3d4197dc6ce57e2a8a643ded26691d8db70e0abeb132e392d3e2647fae51670f0420d6f5d5893f7e6d9a0a5b46aabfff2a0ec7628891ccd5551ec492cecf96d91a22077bc", 0xe0}, {&(0x7f0000000440)="7d588d7eb976ecac83b90d9f7076", 0xe}, {&(0x7f0000000480)='C', 0x1}, {0x0}], 0x5, &(0x7f0000001a00)=[@ip_tos_u8={{0x11}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}], 0x48}, 0x48021) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000051c0)={&(0x7f0000001b00)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000050c0)=[{&(0x7f0000001b80)=""/231, 0xe7}, {0x0}, {&(0x7f0000002c80)=""/242, 0xf2}, {&(0x7f0000002d80)=""/199, 0xc7}, {0x0}, {&(0x7f0000001980)=""/37, 0x25}, {&(0x7f0000004fc0)=""/206, 0xce}], 0x7, &(0x7f0000005180)=""/46, 0x2e}, 0x40000002) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x150}, 0x20000000) r2 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x204, 0x0, 0x0, 0x0, 0x44}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001a80)={0x3, 0x70, 0x0, 0x1, 0x1f, 0x6, 0x0, 0x0, 0x88, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001940), 0x4}, 0x0, 0x5, 0x7fffffff, 0x0, 0x20, 0x2, 0x8000}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0xa, 0x70, 0x80, 0x4, 0x81, 0x1f, 0x0, 0x0, 0x20, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfff, 0x4, @perf_config_ext={0x1ff, 0x7}, 0x8000, 0x0, 0x8, 0x9, 0x3, 0x3, 0x24}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r4 = gettid() r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x2500, 0x2, 0xe343, 0x0, 0x40000000}, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0xaf, 0x0, 0xe4, 0x0, 0x3, 0x10000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4086, 0x2, @perf_config_ext, 0x0, 0xed, 0x4, 0x2, 0x0, 0x1, 0x4}, r4, 0x8, r5, 0x8) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x7, 0x9, 0x1, 0x5, 0x0, 0xfff, 0xd2000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x5}, 0x0, 0x5, 0x3, 0x4, 0x100000001, 0x0, 0x3}, r4, 0xc, r1, 0xa) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 170.563936][T10279] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:09:24 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x37, &(0x7f0000000200)=r0, 0x2e8) socketpair(0x11, 0x2, 0x0, &(0x7f0000000000)) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0x0, @mcast1}, 0x80, 0x0}, 0x0) unlink(&(0x7f0000000040)='./file0\x00') r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) sendmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)}, {&(0x7f0000000240)="92af50463420b2b4e8f3702d57a67c930f0fac62329e0662ae9015dbeb5a2eeda4c0cd535c0e1a1fadad37d4ed47c8eee282771069d20d6ffc85c39568a0c0966bb5f9d1f3ca1becaae59bc5c9ca5f4a4a7cea671b2709d782e86afd04a7f46792", 0x61}, {&(0x7f00000002c0)="0ab7b0789f6417ad3becf3d392c1c0e1d5813d6787bfd93ee43410c54a066e36d963977aaae4ddc4634b7b29dada2670c762accb5b9fcb3405cf1fbf02d8b58dbaf53e24f423ec7e8d7b4bdb2628c3bf91e9bcc3605489546c8b779511f926298035fc56863eea0df5ac4d2eb4ed9b1e45c2e09882b9f1de7bd7f33c8b56b54ba25df1f35d7eed533a0afb46684a619b5db12b51e83dea3a168cd1f65014c472d30bc62ec001d94890f71e6b68173a92b90a2b93de0c43ffe974976cef0b5459531522b0433480092982d5b7ff069d8d5e3fbf7965f1dd02c4774567275f2db282d0c3cc3608823d72e40a8302d8c68bc5b90f51", 0xf4}, {&(0x7f00000003c0)="90fb907871079cf075b90118719cc718a238e784da207780fbd763f6b87e6d616f660f66460ecebbe072cfaa759ec6f568c4b0ef45c9a504a9abd4828224aa35b1d8409fb83644b7497528d0548bd5bc5fb2df48d367cf621f3a51f50d58f5e551f6116604fc1da1156a29d9793a8c7c18", 0x71}, {&(0x7f00000001c0)="b167", 0x2}], 0x5, &(0x7f00000004c0)=[{0x1010, 0x102, 0x8, "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"}, {0x90, 0x0, 0x6, "d2de1d7dd4facbbd655dc27993276d45c3a30b3e27299af9ceb5f4265a77dd18169ef47e34788df26a202b2b9d8be47495b38e38f21bac1bd2aabfa385f11a1d446f08ac52bace972efec9b92371270f7acecb37a931c2143598cbba07a5834a8f8ac1beaba5d3a9d81be2836d6aad3f976c2bbf49de993f65"}, {0xf8, 0x103, 0xda17, "b60367da2f1beed8991beb0b659fe657eb4a5b607e78f63d2c3d8159de242cfd0b6ff8e50aaa1c41d4dc16d8c8f57f65f229d3c8752e729d6041abb666436ffb47dacb69639afa85b7c62d7cbe76843b27f1d33c3a7fe39b42ecefc7d94fad6ee128f42c4a8089a39330f523662064bf6c90f801f0e47418846bb6d44786b46846fc1c45ee92c8423c1d64113cc454cba42f70c944843657800d004b294bd0cfe90e632d0667c403b06f379604bfaca7a883a2d7561ea00bcfc66bc349043b42c48ed8277057b015634eca44eedf168e8299101fd28bfb13fb48e76dd03c1390a129"}, {0x30, 0x187, 0xd04d, "f4c41dddcd127e313232b5b2cff2c03ce57b3ea988b17e73972a0e25"}, {0x88, 0x10f, 0x5, "c89692eea3f7088beed6e6ed364282ea21e45c72d039427a35e840b4b0620fdcfd9d291c1523b72b48bd5e10cb07ef8e9ff6d150764dcde01e464097dd1abcf0d7549ac3c9710a2948a4b21406ba0ec05516844cd358d57a3dbc882e55efbd63d30f72ba1b1a860aed24ee40b1506b4356e9c213"}], 0x1250}, 0x4000000) 23:09:24 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = gettid() openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) openat$cgroup_procs(r4, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x10000000}, r2, 0x0, r3, 0x0) sendmsg$tipc(r1, 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000940)='cpuacct.stat\x00', 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000001600)={&(0x7f0000000980)=@hci={0x1f, 0x1, 0x4}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000a00)="30fe11cc6cb8f5989300086b6e7ae181e0b6a2dc5fafff2719d43d3105a9e5af89ab17bd4b8ef98306b863a45815aeb27b1dda55a58c3dde3d3c07587cd310e01872f9bd76279bf941e86a90f72b8a1bd44ecf58dc8c9bdac32ca89dc79709b3e4795598ec9ad2c2ddddb2a270e4f1d94bfb6630183a6de8c9e5899e9be876cd9995359f0d17", 0x86}, {&(0x7f0000000ac0)="9b0d4be4a2090cc31352dcf48e3153487b168589409c6da90f782f6dcdbb4ad8f814eb50715737d0b0e392d18c45bf464ffdfdec6bde058622b1bbab6dd4459d37823ea0460c9aed9fe22ba807f2deec1ff23ad38cb8b373188c14b959c73ded03f407fedd76849d6df39ab1ba8521c07713fce1fc0bd9b90c650c31a4eeaf2776", 0x81}, {&(0x7f0000000b80)="a8b51d93dba61bec8f7479121230de83b5facf63fccfd8f8ba299281925fdb237309bfc6850d570e37b3a316b5b3a894adb1826e0c55df32ddc56d133092c7c3a13d131a58dad5b9a99bb603889f1d8f8371e7a21a1197e5b28cb24b9e280c790d88f52766ca05b13710e062de7f1f3aa980c5fa15be4de39663990224b1b5b9aeb3a2c11ee33d26b7313c92d96e87f849f671f9ebd40308f9e31e497d5230ec7483ee09b22216f36b9829719f4bfd2799ff801ae8e81c4c5ee57d", 0xbb}, {&(0x7f0000000c40)="d053b0fabf8007e0754ce25b12e7716c7a96d5e5ef6689c916cb133505621630245a281be3f39c1ed927ad452a5c3c5eb1fa29e255b045edd07730643ac4b1992ce1754e8df760e795f78bc0f64425f9b9deaf4fb75fd59f25cbabedb1aeec7cee1e6d3525f6dd76532cc883e210b82d1d1c1b731f68b8fff0b6abf2e21d427ad255173359f8f67407", 0x89}, {&(0x7f0000000d00)="1782e40e74083d286d122c25468dae412eb60bf30e987005519d45f67047e5daa58689cf2db65ebd12a03e241593abbb1699c583d735e85cfce3d56a64d92074a1d50a7c2e88ca8ecc14bbdc5965c1b17224fd6966b28364cbc0c844b090a3d3a74bf11b1ac8f62767685f4a0eb1c52d76062441bce218724a7c81180056b947af63c10c25b9c97e9355b5a6ee8d54abdcadf5bc501da0e2a903b865bda4fc677e80799bba64f695c5f36ccb8ba6e3f71e237127ae235160b30693d7be5dbcefaa89c2af8697bf7bd5b0a91b9303ccd05e2dc76399ffeb493d574100482cbd8ad9d0a12650", 0xe5}, {&(0x7f0000000e00)="a93e83f22fadf40671e504c02cfb939f108d5c52b1aa3bccb25a313e5ccf61f1ed", 0x21}, {&(0x7f0000000e40)="a6ab12", 0x3}, {&(0x7f0000000e80)="fe9cca1dbd5bbb49b84811d601285341e7ea77c39340684e6c1eef2b70775b38e665f3a1bf1d8497ae96324d464fd1cc4d6e1785e76aca0938b59c429f8d88d268d140d0c6dda925ef9096030077b5fbc41bf9e9246a07e5d16029631c551f4573fe942851eb4fce3264fc46c1a68f5585437b6563de6d5f3acefc96ba5349d31477c5d36c6c40b238f3cda5be", 0x8d}], 0x8, &(0x7f0000000fc0)=[{0xd0, 0x110, 0x7, "6db6881bb0fcd3a9882ee7e49f771582bef63f0c69bd6e6f4f4823d27b9beeb0231d4339281713930236927ffbdd911f68755edfb8cf9941fa6fe5daafc62058cc5b62c2ecf001c5807996ba14455c5c19dcf21f62ad43b6ba55dde850557a2dc9e10f759163f45d1fd11defe94d4df4fb316c08023287b77a796d75ba91e9de13bdc3b3d740bed609e5f9b83746c4c04ab7af5388136503810f15df863c979e4cdd3f296c134720c42fb94063c07d40daaa27b7106ce0ddda7ef8"}, {0xe8, 0x104, 0xffffff81, "b469ef76084cdb42a70f3dc2dba915a1b4f3e5638c8df248f7a701d83f55d85d7964c25fc143ca9ea81c0b5c29535043008f613980fb8e92588e5631b53b1f822f38feded1a4d9884c118a2f67a217ed717e564f4cfec224338424b6128dff2a5167bb6e4ffdb3ef07dd64f29ce924394cccb525d4b1847fadbc203b8dae8cea5f9a528fde672cdefdc9c2e143658bbc29770e5bae8011e703fcd41042d4d5f2da0cb690efe42d398a86d1baff53127af4df4df3a09369e1f7c702ca36c99520b766c2aacdfc92310bd1479d8378670f51df"}, {0xa0, 0x10e, 0x80000000, "d392ff14af266ce38f494988aaf2839d52a3f02620a6a6c1c323ecec6734450e08abfb98d9b47da91e5c0b1f6d987116ab669647aa58c4756aca6e178699fac10e094374106afb3a2425963ef6d3a58dc4efe260ce8c68faf966e048aa932e91259013c66d0b5e708b249659060b2c7957186b54a305c4a30403ec6866aa75daa0ab15c36aa51d7f62be6af42a"}, {0xc0, 0x101, 0x9, "86c130aec6b160e90cb938f5d80da451256c4d5ef2a92b428472ab2e24b6239a9585e573dd160f14ea115badd3c403cfde43083dceb143243afdde322bde955156cebff9d213e715b1865e48d032b2d15656a7ba9acf0a8f909d417270ee545e8d6e94338d853de788e79a1ae7521651d1605e20cd7c438ee7dcfdff7ce610582a59fd3b5577fa71750e150af3f4b6be5458f56966ccc58325680e944566873219cfd244d82fecb44b8fffe19e8935b5"}, {0x70, 0x102, 0x7, "5397a692d97003d56762e7ecae881f9ba1324de63bd31108ffba000f6e000f0cfb5ee1a9a5a969da8834cc1c4c0b825bcaac529fe5ab122a2a42548b7c559efb26f63310c85a656bcd6a09e5f54adf5214086c982874cd911d"}, {0x100, 0x0, 0x100000, "66a0fddf7b9d029a112b5b7b82517dd3fd3f6fab1fb44c15f40381934160a8ac96e8365302f91bcacddb948cf56c2d2fdfcd9c2ebbc15ce3f64c33e266ac33fa54b15f8e7692346827b9692ae32c1fda9dcc52284f4fd7991941675f9643489bf83a1a4ea571a0f4a26f1e9a9e6dece4a9209bdefc13fd8f68f1ef51c201b69d5cd5ad8656232b32fcec7deae812db91d7989203616c56bd3f3e3d945131f69bd67ea3f5403da39b80f2c4a4c77fc07a35db23f9adc7ebff39909eaf3f4147f4100927bf783c44c908ba6998e8c07807ff05b1c8d773fa4a7882e2522cb38f21bd6a54c398c325046294c0c9af652130"}, {0xe8, 0x117, 0x3, "d7aaaedf7d0365ff09bc77254beb27a60827e67951297c8b3656e587ca7cf12a97af1e871520d8002bd811ca2927b69f1944fde77d270e55522b7eb606b49c486c48d21e3ab7fb90535d5f69870e43df59ed1a5c84409ea5d6cbdbd584dd94693ddcd51150d5fe3761d70dc32ceda82d2c78ba44170c9ec8185d56e33f5137c7aa1c78d099ca79fb76699ef6e510767ea376b00bd1e84f2e2b032e11befb3d8c7d1a2b5a83c9e63625009794fadbfa27c6252e6c1948b2284f0353600b20df0fdaa1a2c7fba78a8e067cf6e91d63faab05acc44935"}, {0xa0, 0x117, 0x6, "8cdfd2a77d05df8f321f819a1b4c29362dcd72520e51185672ec712ea77086caf2ac191d460cb409c8393300be265fa556f4734be02c633e381012bc32255b5a28b51422445bfacf25f410df1a54e6c8fcadf279cad9b50684125503541eb4a40b3e156bf41a8eef69babef9e8bfeba9e628be5cda8ad3e06f5de57bb96b9d03a458c7e0d44debe09c855269de6f96"}], 0x610}, 0x800) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x45, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000380)}, 0x1013, 0x0, 0xfffffffb}, 0x0, 0x0, r0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xda00) write$cgroup_int(r6, &(0x7f0000000200), 0x43400) 23:09:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:24 executing program 5: socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x2}, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04000056008109e00f80ecdb4cb9f207c804a00d00c00e02002efb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:09:24 executing program 5: socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x2}, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="2e04000056008109e00f80ecdb4cb9f207c804a00d00c00e02002efb0a0002000a0ada1b40d805000300c50083b8", 0x2e}], 0x1, 0x0, 0x0, 0x5865}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:09:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:25 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:25 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:25 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0xa, 0x2) close(r1) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8922, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='f2fs_file_write_iter\x00', r3}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) [ 172.203304][T10331] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 23:09:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x10000400204) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x2004c010) 23:09:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x20, 0x0, 0x8a, 0x3f, 0x0, 0x0, 0x44002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x2, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x34000}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x0, "02"}], 0x18, 0xfe80}, 0xfc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000001940)={r3}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x90, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) 23:09:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:09:26 executing program 4: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) 23:09:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:26 executing program 5: socketpair(0x1e, 0x0, 0x3, 0x0) 23:09:26 executing program 2: socketpair(0x10, 0x3, 0x9, 0x0) 23:09:27 executing program 4: socketpair(0x2, 0x3, 0x8, &(0x7f0000000000)) 23:09:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:09:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x0, 0x9}, 0x40) 23:09:27 executing program 3: socketpair(0x11, 0x2, 0x5, &(0x7f0000000180)) 23:09:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:27 executing program 3: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:09:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) 23:09:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:27 executing program 4: socketpair(0xa, 0x2, 0x0, &(0x7f0000000140)) 23:09:27 executing program 2: socketpair(0x23, 0x0, 0x1, 0x0) 23:09:27 executing program 5: socketpair(0x28, 0x0, 0x0, 0x0) 23:09:27 executing program 3: socketpair(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x1) 23:09:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:27 executing program 4: socketpair(0x1e, 0x2, 0x0, &(0x7f0000000140)) 23:09:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:28 executing program 2: socketpair(0x2, 0x2, 0x0, &(0x7f0000000140)) 23:09:28 executing program 4: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe) 23:09:28 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/ipc\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/ipc\x00') 23:09:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c9b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:09:28 executing program 5: socketpair(0x28, 0x0, 0xffffffff, 0x0) 23:09:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:28 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:09:28 executing program 3: 23:09:28 executing program 4: 23:09:28 executing program 2: 23:09:28 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='[-%\'!/[\x00') 23:09:28 executing program 3: 23:09:28 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:09:28 executing program 2: 23:09:28 executing program 4: 23:09:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:29 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 23:09:29 executing program 3: 23:09:29 executing program 5: 23:09:29 executing program 4: 23:09:29 executing program 2: 23:09:29 executing program 3: 23:09:29 executing program 5: 23:09:29 executing program 4: 23:09:29 executing program 2: 23:09:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:29 executing program 3: 23:09:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:29 executing program 5: 23:09:29 executing program 4: 23:09:29 executing program 2: 23:09:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:29 executing program 3: 23:09:29 executing program 4: 23:09:29 executing program 5: 23:09:29 executing program 2: 23:09:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:29 executing program 5: 23:09:29 executing program 4: 23:09:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:30 executing program 3: 23:09:30 executing program 2: 23:09:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:30 executing program 5: 23:09:30 executing program 4: 23:09:30 executing program 3: 23:09:30 executing program 2: 23:09:30 executing program 5: 23:09:30 executing program 4: 23:09:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:30 executing program 3: 23:09:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:30 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:09:30 executing program 2: socketpair(0x3, 0x0, 0x0, 0x0) 23:09:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c00)) 23:09:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x0, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:30 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 23:09:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x3, 0xff, 0x0, 0x1}, 0x40) 23:09:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x0, 0xf492, 0x4, 0x1}, 0x40) 23:09:31 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000780)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000007c0)='./cgroup/syz0\x00', 0x200002, 0x0) 23:09:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x3, 0x3, 0xff, 0x0, 0x1}, 0x40) 23:09:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x8f9b093dd39b4def, 0x7, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:09:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x0, 0xf492, 0x4, 0x1}, 0x40) 23:09:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xd}, 0x40) 23:09:31 executing program 5: socketpair(0x2, 0xa, 0x300, &(0x7f0000000000)) 23:09:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 23:09:31 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x650001, 0x0) 23:09:31 executing program 4: socketpair(0x2, 0xa, 0xf200, &(0x7f0000000000)) 23:09:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x0, 0xf492, 0x4, 0x1}, 0x40) 23:09:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x405}, 0x40) 23:09:31 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x212300, 0x0) 23:09:32 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x10040, 0x0) 23:09:32 executing program 5: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 23:09:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0x0, 0x4, 0x1}, 0x40) 23:09:32 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x127102, 0x0) 23:09:32 executing program 3: bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0xfffffffffffffffd, 0x0) 23:09:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x8, 0x1, &(0x7f0000000080)=@raw=[@generic], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 23:09:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000001240)=ANY=[@ANYBLOB="9feb01001800000000000000840000008400000008"], &(0x7f0000000200)=""/4096, 0xa4, 0x1000, 0x1}, 0x20) 23:09:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0x0, 0x4, 0x1}, 0x40) 23:09:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000001240)=ANY=[@ANYBLOB="9feb01001800000000000000840000008400000008000000040000000000000e02080000010000000f0000000000000900000000050000000000000c02000000000000000400000d000000000f0000000300000008000000000000000d000000050000000e000000050000000000000000000003000000000300000020000000feffffff000000000000000300000000020000000300000081000000003061306130"], &(0x7f0000000200)=""/4096, 0xa4, 0x1000, 0x1}, 0x20) 23:09:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x7, 0x1, &(0x7f0000000140)=@raw=[@generic], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:09:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000001240)=ANY=[], &(0x7f0000000200)=""/4096, 0xa4, 0x1000, 0x1}, 0x20) 23:09:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000001240)=ANY=[@ANYBLOB="9feb01001800000000000000840000008400000008000000040000000000000e02080000010000000f0000000000000900000000050000000000000c02000000000000000400000d000000000f0000000300000008000000000000000d000000050000000e000000050000000000000000000003000000000300000020000000feffffff0000000000000003000000000200000003000000810000000030613061"], &(0x7f0000000200)=""/4096, 0xa4, 0x1000, 0x1}, 0x20) 23:09:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0x0, 0x4, 0x1}, 0x40) 23:09:32 executing program 2: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x80000001}, 0x8) 23:09:32 executing program 3: bpf$OBJ_GET_PROG(0xa, 0x0, 0x0) 23:09:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x0, 0x1}, 0x40) 23:09:32 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000005480)='ns/time\x00') 23:09:32 executing program 4: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) 23:09:32 executing program 2: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000340), 0x8) 23:09:32 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001600)) 23:09:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:33 executing program 5: socketpair(0x2, 0x5, 0x3, &(0x7f0000000500)) 23:09:33 executing program 2: bpf$OBJ_GET_PROG(0x16, &(0x7f0000000340)={0x0, 0x0, 0x8}, 0x10) 23:09:33 executing program 4: socketpair(0x26, 0x0, 0x0, &(0x7f00000000c0)) 23:09:33 executing program 3: bpf$OBJ_GET_PROG(0xb, &(0x7f0000000340)={0x0, 0x0, 0x8}, 0x10) 23:09:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x0, 0x1}, 0x40) 23:09:33 executing program 2: bpf$OBJ_GET_PROG(0x10, 0x0, 0x0) 23:09:33 executing program 3: bpf$OBJ_GET_PROG(0xe, 0x0, 0x0) 23:09:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xf, 0xffffffffffffffff, 0x0) 23:09:33 executing program 5: bpf$OBJ_GET_PROG(0x8, &(0x7f0000000340)={0x0, 0x0, 0x8}, 0x10) 23:09:33 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0xb, 0x4}]}}, &(0x7f00000000c0)=""/209, 0x26, 0xd1, 0x1}, 0x20) 23:09:33 executing program 3: bpf$OBJ_GET_PROG(0x4, 0x0, 0x0) 23:09:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x0, 0x1}, 0x40) 23:09:33 executing program 5: bpf$OBJ_GET_PROG(0x5, 0x0, 0x0) 23:09:33 executing program 4: bpf$OBJ_GET_PROG(0xf, 0x0, 0x0) 23:09:33 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001400)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:09:33 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:09:34 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:09:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:09:34 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:09:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:09:34 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:34 executing program 2: 23:09:34 executing program 5: 23:09:34 executing program 4: 23:09:34 executing program 1: 23:09:34 executing program 3: 23:09:34 executing program 2: 23:09:34 executing program 5: 23:09:34 executing program 4: 23:09:34 executing program 2: 23:09:34 executing program 3: 23:09:34 executing program 1: 23:09:34 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:34 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x200001, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 23:09:34 executing program 5: 23:09:34 executing program 3: 23:09:34 executing program 2: 23:09:34 executing program 1: 23:09:35 executing program 5: 23:09:35 executing program 4: 23:09:35 executing program 3: 23:09:35 executing program 2: 23:09:35 executing program 1: 23:09:35 executing program 3: 23:09:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:35 executing program 5: 23:09:35 executing program 4: 23:09:35 executing program 2: 23:09:35 executing program 1: 23:09:35 executing program 3: 23:09:35 executing program 3: 23:09:36 executing program 2: 23:09:36 executing program 4: 23:09:36 executing program 5: 23:09:36 executing program 1: 23:09:36 executing program 4: 23:09:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:36 executing program 3: 23:09:36 executing program 5: 23:09:36 executing program 2: 23:09:36 executing program 1: 23:09:36 executing program 3: 23:09:36 executing program 4: 23:09:36 executing program 2: 23:09:36 executing program 5: 23:09:36 executing program 1: 23:09:36 executing program 2: 23:09:36 executing program 5: 23:09:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:36 executing program 4: 23:09:36 executing program 1: 23:09:36 executing program 2: 23:09:36 executing program 5: 23:09:36 executing program 3: 23:09:36 executing program 4: 23:09:37 executing program 5: 23:09:37 executing program 1: 23:09:37 executing program 2: 23:09:37 executing program 3: 23:09:37 executing program 4: 23:09:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:37 executing program 1: 23:09:37 executing program 5: 23:09:37 executing program 4: 23:09:37 executing program 3: 23:09:37 executing program 2: 23:09:37 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000400)) 23:09:37 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x34, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r3, 0x66, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={0x0, 0x0, 0x0}, 0x40040c4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001280)={r1, &(0x7f0000001380)="aa48a4519dbacbc8d7de0ad697464dcc6b76e3316503ba8daaf5940387c9331d06d3e3fb7201367e5ea025aacd5591aa69ae407e81f252e29e1d8b757f995f5fd964060e31ba69e2a50f4b2f7ef41ee49aafea873a467e010a61324c65bcec8cd55fdb72a0799f723baa932f0121ff9fd9a5f75df584"}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:09:37 executing program 5: socketpair(0x1e, 0x4, 0x0, &(0x7f0000001540)) 23:09:37 executing program 3: socketpair(0x1d, 0x0, 0x10000001, &(0x7f0000000000)) 23:09:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x103c}, [@map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf400}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x5, 0x2, 0xf, 0x1f, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x0, r3, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x7, 0x6, 0x1}, 0x10, 0x275fc, r4}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, &(0x7f00000009c0)=ANY=[@ANYBLOB="18004ec4c5c21760634763830000000000040000000000000000008abfd502d4c8cf6e4492c36f18a7177594ae0000000077682ef312fa76611676a6dd2aceb2d29e1d35e93a10b2a88f331d906612c73d5964f42e3f491b2a9a2943ec28a7c207a9f52c63668c00eff2de1e44617ceadfa9e01ea0a6c20951e481287de3c055a494b2b4693a14c5ac89cd19d9b0df1e36dbce1d6af388a520a25a41f11524bb81a515b4e2e0a8e9118085d525012d6033aeb1d1ce", @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00'], &(0x7f0000000240)='GPL\x00', 0x40, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0xa}, 0x8, 0x10, 0x0}, 0x78) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r0, 0x19, 0x6, r5}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) 23:09:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x103c}, [@map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf400}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x5, 0x0, 0xf, 0x1f, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x17, r2, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x7, 0x6, 0x1}, 0x10, 0x275fc}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r0, 0x19, 0x6, r3}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) 23:09:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x1, &(0x7f0000000340)=@raw=[@alu], &(0x7f0000000380)='syzkaller\x00', 0xffff20eb, 0xc1, &(0x7f00000003c0)=""/193, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:09:38 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000400)=""/4080, 0x1000}, {&(0x7f0000001740)=""/190, 0xffffff81}, {&(0x7f0000000080)=""/115, 0x73}], 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x4884) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0xf, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x46, &(0x7f0000000300)=""/70, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 23:09:38 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x34, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r3, 0x66, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={0x0, 0x0, 0x0}, 0x40040c4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001280)={r1, &(0x7f0000001380)="aa48a4519dbacbc8d7de0ad697464dcc6b76e3316503ba8daaf5940387c9331d06d3e3fb7201367e5ea025aacd5591aa69ae407e81f252e29e1d8b757f995f5fd964060e31ba69e2a50f4b2f7ef41ee49aafea873a467e010a61324c65bcec8cd55fdb72a0799f723baa932f0121ff9fd9a5f75df584"}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 184.684568][T10741] EXT4-fs warning (device sda1): ext4_group_add:1660: No reserved GDT blocks, can't resize 23:09:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0]}}, &(0x7f0000000100)=""/164, 0x33, 0xa4, 0x1}, 0x20) 23:09:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r2}, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000004000040000000000000200009500000000000000d387777ab82499fd7a38de0cd87509fd1d80585afff33091b533c720577af017450b2a776733ceb617f121d79e3628e72be0d39e77dcb168873294214f541bb89938c19978ea22254c58d75439a1edfee2adfeafe92d14ffab3ddc1dc21efe6f7c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689d486e66c4a5e059db4238ee52d47e704465a6a9726ba058bd85acc9322902ce974e50faf989fd44b66da1b795d04df0d9bfd563c608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3029ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821aeec756c97933bd07d9e262a5c356d074eeb638904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af47d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f7dab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd22db832a98c116b0000d92a6dab58e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f98356e321bb3ef7bfd1c957c1fe85603ff909878b9db38af432516700efc72e2847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb342b0ebac9c727e52d462ddea9e404f273b7f4f38cc671f30d17ed7058cca7ca3460a1b5877fe36b2a65627c10daa87ee6a9caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb00000000000000000ef52bdeb49a189c429363effa95251bb75537b668f2a0a3b4e213425caaa03eb17c943a912122013f16ca05cc2a99f91c85c5694396d1b4a3c028336abf6dfb3fc9dbd0ef24b01da4e278114cb81a928731930bad795c1b39e0ab09c047bc9ce9f0fe32da6abad0e2bf7e5a30722392b7666b5831d67bb52e9f0da712f2af42a11ffd44f481a546ce0774fc7369dc7e7583de2f22d3e1ade747bab0c4af9b23ed6c0bb71944acc239f9616759ffb423670051caa7960b11ffbc04e9be5539d1437987d4340e2a81870331ea01c57609758b9b26acbfbc79fbf447b204e05844c00f2577581d03a19515e3120e1673ceaec0c59ca6f8a68d2f47cb08fd9c5885d06833b094f91a8ea02318318cc6b8d6ad77a8d2d3ff8779d34ac10c76ad6a099c050467ced134bafebcdd91664bf1a8fd667fd7d0686e5e3a50e8d6b39c73e3a9392814f525429e067ac024c00b66dc2873d8d0992354bf8096355c27bef22a91deeb17107895beff0f3728c42ee0581562fc7ed0a230645b1f5934adf6d6f9a4e01c6d659ba585a60790802ed79f47c1ccbf8524fa10398ef91e53a69b06b54a3e3e3ef13addeb6b95de0753bf5d05081157466f48d7758882e903cda3e93ece7c8e64719067ada30aec0f767d91c0678d9be28d0e6c20a25dca96d3af2942d34b93a69fcebcbb01df095836ec2f1fca52eb513b1308cfa0f7"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x103c}, [@map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf400}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x5, 0x2, 0xf, 0x1f, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x0, r3, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x7, 0x6, 0x1}, 0x10, 0x275fc, r4}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, &(0x7f00000009c0)=ANY=[@ANYBLOB="18004ec4c5c21760634763830000000000040000000000000000008abfd502d4c8cf6e4492c36f18a7177594ae0000000077682ef312fa76611676a6dd2aceb2d29e1d35e93a10b2a88f331d906612c73d5964f42e3f491b2a9a2943ec28a7c207a9f52c63668c00eff2de1e44617ceadfa9e01ea0a6c20951e481287de3c055a494b2b4693a14c5ac89cd19d9b0df1e36dbce1d6af388a520a25a41f11524bb81a515b4e2e0a8e9118085d525012d6033aeb1d1ce", @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00'], &(0x7f0000000240)='GPL\x00', 0x40, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0xa}, 0x8, 0x10, 0x0}, 0x78) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r0, 0x19, 0x6, r5}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) 23:09:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000004000040000000000000200009500000000000000d387777ab82499fd7a38de0cd87509fd1d80585afff33091b533c720577af017450b2a776733ceb617f121d79e3628e72be0d39e77dcb168873294214f541bb89938c19978ea22254c58d75439a1edfee2adfeafe92d14ffab3ddc1dc21efe6f7c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689d486e66c4a5e059db4238ee52d47e704465a6a9726ba058bd85acc9322902ce974e50faf989fd44b66da1b795d04df0d9bfd563c608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3029ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821aeec756c97933bd07d9e262a5c356d074eeb638904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af47d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f7dab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd22db832a98c116b0000d92a6dab58e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f98356e321bb3ef7bfd1c957c1fe85603ff909878b9db38af432516700efc72e2847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb342b0ebac9c727e52d462ddea9e404f273b7f4f38cc671f30d17ed7058cca7ca3460a1b5877fe36b2a65627c10daa87ee6a9caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb00000000000000000ef52bdeb49a189c429363effa95251bb75537b668f2a0a3b4e213425caaa03eb17c943a912122013f16ca05cc2a99f91c85c5694396d1b4a3c028336abf6dfb3fc9dbd0ef24b01da4e278114cb81a928731930bad795c1b39e0ab09c047bc9ce9f0fe32da6abad0e2bf7e5a30722392b7666b5831d67bb52e9f0da712f2af42a11ffd44f481a546ce0774fc7369dc7e7583de2f22d3e1ade747bab0c4af9b23ed6c0bb71944acc239f9616759ffb423670051caa7960b11ffbc04e9be5539d1437987d4340e2a81870331ea01c57609758b9b26acbfbc79fbf447b204e05844c00f2577581d03a19515e3120e1673ceaec0c59ca6f8a68d2f47cb08fd9c5885d06833b094f91a8ea02318318cc6b8d6ad77a8d2d3ff8779d34ac10c76ad6a099c050467ced134bafebcdd91664bf1a8fd667fd7d0686e5e3a50e8d6b39c73e3a9392814f525429e067ac024c00b66dc2873d8d0992354bf8096355c27bef22a91deeb17107895beff0f3728c42ee0581562fc7ed0a230645b1f5934adf6d6f9a4e01c6d659ba585a60790802ed79f47c1ccbf8524fa10398ef91e53a69b06b54a3e3e3ef13addeb6b95de0753bf5d05081157466f48d7758882e903cda3e93ece7c8e64719067ada30aec0f767d91c0678d9be28d0e6c20a25dca96d3af2942d34b93a69fcebcbb01df095836ec2f1fca52eb513b1308cfa0f747ce8c928e038f035a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x103c}, [@map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf400}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x5, 0x0, 0xf, 0x1f, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x17, r2, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x7, 0x6, 0x1}, 0x10, 0x275fc}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r0, 0x19, 0x6, r3}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) 23:09:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000004000040000000000000200009500000000000000d387777ab82499fd7a38de0cd87509fd1d80585afff33091b533c720577af017450b2a776733ceb617f121d79e3628e72be0d39e77dcb168873294214f541bb89938c19978ea22254c58d75439a1edfee2adfeafe92d14ffab3ddc1dc21efe6f7c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689d486e66c4a5e059db4238ee52d47e704465a6a9726ba058bd85acc9322902ce974e50faf989fd44b66da1b795d04df0d9bfd563c608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3029ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821aeec756c97933bd07d9e262a5c356d074eeb638904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af47d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f7dab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd22db832a98c116b0000d92a6dab58e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f98356e321bb3ef7bfd1c957c1fe85603ff909878b9db38af432516700efc72e2847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb342b0ebac9c727e52d462ddea9e404f273b7f4f38cc671f30d17ed7058cca7ca3460a1b5877fe36b2a65627c10daa87ee6a9caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb00000000000000000ef52bdeb49a189c429363effa95251bb75537b668f2a0a3b4e213425caaa03eb17c943a912122013f16ca05cc2a99f91c85c5694396d1b4a3c028336abf6dfb3fc9dbd0ef24b01da4e278114cb81a928731930bad795c1b39e0ab09c047bc9ce9f0fe32da6abad0e2bf7e5a30722392b7666b5831d67bb52e9f0da712f2af42a11ffd44f481a546ce0774fc7369dc7e7583de2f22d3e1ade747bab0c4af9b23ed6c0bb71944acc239f9616759ffb423670051caa7960b11ffbc04e9be5539d1437987d4340e2a81870331ea01c57609758b9b26acbfbc79fbf447b204e05844c00f2577581d03a19515e3120e1673ceaec0c59ca6f8a68d2f47cb08fd9c5885d06833b094f91a8ea02318318cc6b8d6ad77a8d2d3ff8779d34ac10c76ad6a099c050467ced134bafebcdd91664bf1a8fd667fd7d0686e5e3a50e8d6b39c73e3a9392814f525429e067ac024c00b66dc2873d8d0992354bf8096355c27bef22a91deeb17107895beff0f3728c42ee0581562fc7ed0a230645b1f5934adf6d6f9a4e01c6d659ba585a60790802ed79f47c1ccbf8524fa10398ef91e53a69b06b54a3e3e3ef13addeb6b95de0753bf5d05081157466f48d7758882e903cda3e93ece7c8e64719067ada30aec0f767d91c0678d9be28d0e6c20a25dca96d3af2942d34b93a69fcebcbb01df095836ec2f1fca52eb513b1308cfa0f747ce8c928e038f035a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x103c}, [@map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf400}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x5, 0x0, 0xf, 0x1f, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x17, r2, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x7, 0x6, 0x1}, 0x10, 0x275fc}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r0, 0x19, 0x6, r3}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) 23:09:38 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000002, 0x0) recvmsg$kcm(r0, &(0x7f0000001900)={0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000400)=""/4080, 0x1000}, {&(0x7f0000001740)=""/190, 0xffffff81}, {&(0x7f0000000080)=""/115, 0x73}], 0x3}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x6611, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1}, 0x4884) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0xf, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x46, &(0x7f0000000300)=""/70, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f00000001c0)='freezer.parent_freezing\x00', 0x0, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 23:09:38 executing program 4: socketpair(0x1d, 0x0, 0x0, &(0x7f0000001540)) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) [ 185.324912][T10764] EXT4-fs warning (device sda1): ext4_group_add:1660: No reserved GDT blocks, can't resize 23:09:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="180000004000040000000000000200009500000000000000d387777ab82499fd7a38de0cd87509fd1d80585afff33091b533c720577af017450b2a776733ceb617f121d79e3628e72be0d39e77dcb168873294214f541bb89938c19978ea22254c58d75439a1edfee2adfeafe92d14ffab3ddc1dc21efe6f7c3913f273d7b48d10b9904fda943414bf2f1c68c4878937c8f83a5203d5b63a2689d486e66c4a5e059db4238ee52d47e704465a6a9726ba058bd85acc9322902ce974e50faf989fd44b66da1b795d04df0d9bfd563c608880516f25136a81d6b48d5f205d0d44bfabd7013f8192a3029ad96441ba7db2c3e80f0dbf59164e8806259d3b7633f704b15c3dc9259fa3aa3106e4821aeec756c97933bd07d9e262a5c356d074eeb638904c8af7cd704f4afa93fc61d6ba0e2148b09a28cd376bc43a1445c635c73a6bd9cda98b27f9981f6af47d74e057515bef88b90f987de14f2a9e1b07dd8b865715f25a4f95cc0024e18e96570000f7dab1a31b2f0fb51e0d9348aa80e2e60cd60800000088b06a13d14f14e829e4330e4475096c886864c5bf8be6441e7e24a4162d88a668b65bc80a10d3357cd22db832a98c116b0000d92a6dab58e1a4ee680c94407e1ee01d68139635ab636723848d90a40d2a2298b5cb3cbe8366b09957fc5ee5472fb7671f1b99a7b0508949eaf27f98356e321bb3ef7bfd1c957c1fe85603ff909878b9db38af432516700efc72e2847e1e86967d2a12a357a69a6cd73b73cfff08965818b338e5f5d20031bad9c612f6ea2861dd34e5be9aa536bd5b16857f8a07c834e3bcd414872719ba6e7c6936dd077c98e273537b833df0f0d1f75fb153292c2c8d93d7bede97270f771917308d5cedb342b0ebac9c727e52d462ddea9e404f273b7f4f38cc671f30d17ed7058cca7ca3460a1b5877fe36b2a65627c10daa87ee6a9caa32aef136326076e22f7661c916d0215a6c6b6b140ed86a97ab7721f1eb00000000000000000ef52bdeb49a189c429363effa95251bb75537b668f2a0a3b4e213425caaa03eb17c943a912122013f16ca05cc2a99f91c85c5694396d1b4a3c028336abf6dfb3fc9dbd0ef24b01da4e278114cb81a928731930bad795c1b39e0ab09c047bc9ce9f0fe32da6abad0e2bf7e5a30722392b7666b5831d67bb52e9f0da712f2af42a11ffd44f481a546ce0774fc7369dc7e7583de2f22d3e1ade747bab0c4af9b23ed6c0bb71944acc239f9616759ffb423670051caa7960b11ffbc04e9be5539d1437987d4340e2a81870331ea01c57609758b9b26acbfbc79fbf447b204e05844c00f2577581d03a19515e3120e1673ceaec0c59ca6f8a68d2f47cb08fd9c5885d06833b094f91a8ea02318318cc6b8d6ad77a8d2d3ff8779d34ac10c76ad6a099c050467ced134bafebcdd91664bf1a8fd667fd7d0686e5e3a50e8d6b39c73e3a9392814f525429e067ac024c00b66dc2873d8d0992354bf8096355c27bef22a91deeb17107895beff0f3728c42ee0581562fc7ed0a230645b1f5934adf6d6f9a4e01c6d659ba585a60790802ed79f47c1ccbf8524fa10398ef91e53a69b06b54a3e3e3ef13addeb6b95de0753bf5d05081157466f48d7758882e903cda3e93ece7c8e64719067ada30aec0f767d91c0678d9be28d0e6c20a25dca96d3af2942d34b93a69fcebcbb01df095836ec2f1fca52eb513b1308cfa0f747ce8c928e038f035a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x103c}, [@map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf400}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x5, 0x0, 0xf, 0x1f, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x17, r2, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x7, 0x6, 0x1}, 0x10, 0x275fc}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r0, 0x19, 0x6, r3}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) 23:09:38 executing program 5: socketpair(0x28, 0x1, 0x0, &(0x7f0000001540)) [ 185.474262][T10776] can: request_module (can-proto-0) failed. 23:09:38 executing program 3: socketpair(0x26, 0x5, 0x4, &(0x7f0000000000)) 23:09:39 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="950000000000000018100000", @ANYRES32, @ANYBLOB="00000000400000008510"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 185.565529][T10776] can: request_module (can-proto-0) failed. 23:09:39 executing program 4: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000100), 0xfffffffffffffec6) 23:09:39 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/net/tun\x00', 0x208c00, 0x0) 23:09:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @const]}}, &(0x7f0000000280)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 23:09:39 executing program 3: socketpair(0x28, 0x0, 0x101, &(0x7f0000000080)) 23:09:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_tracing={0x1a, 0x8, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x103c}, [@map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf400}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @generic={0x5, 0x0, 0xf, 0x1f, 0x2}]}, &(0x7f0000000200)='syzkaller\x00', 0x10000, 0x0, 0x0, 0x41000, 0x4, [], 0x0, 0x17, r2, 0x8, &(0x7f00000002c0)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x7, 0x6, 0x1}, 0x10, 0x275fc}, 0x78) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000180)={@cgroup=r0, r0, 0x19, 0x6, r3}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) 23:09:39 executing program 4: socketpair(0x1e, 0x0, 0x7f, &(0x7f00000001c0)) 23:09:39 executing program 5: socket$kcm(0x29, 0xf, 0x0) 23:09:39 executing program 3: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000040), 0x61) 23:09:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000a00)={0xd}, 0x40) 23:09:39 executing program 4: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='(:}\x00') [ 186.297567][T10805] EXT4-fs warning (device sda1): ext4_group_add:1660: No reserved GDT blocks, can't resize 23:09:39 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x7}, 0x10) 23:09:39 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 23:09:39 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001140)) 23:09:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:39 executing program 1: bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000080), 0xffffffffffffff8a) 23:09:40 executing program 5: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82c34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2014}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:09:40 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/net/tun\x00', 0x840, 0x0) 23:09:40 executing program 4: perf_event_open(&(0x7f00000021c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x91240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:09:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10200}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) 23:09:40 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1}, 0x0) 23:09:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002880)={&(0x7f0000000040)=@un=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000001300)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000001380)=[{0x90, 0x0, 0x0, "653b7e04eba924f622fef6027f0341330b9eda7f956be471ffeed7635a3736063e397eeb4d1194fc9fea97a85ae115ea405bdbd4e62be8f3f6b26cfe3880d71457baf58ab0052eed6dd12ba4b3a3a07d50da7ef7e29e98a8e4e79b4b919838d54735d59d2e6cd83caff3cf90d29408bc29141871c1509d5ef7"}, {0x110, 0x0, 0x0, "a19fd8d377a666ec35ae98f9fb33895040b4bfae3b97ef241c94c0c2d2f6f8d3b7a4ece5c70c1873bced74a20933909bfba9679a8ef33ea3c406dd25fda842c3e19330da30e11ae69c457eb517bab7af2c6d675fddab9c671e15b96446a3b65797f1b18b604d7758045afcb2677f2ad2c88ab4ee815b773ff0f9b42b7511e9363204be5b3c9a5d58663c8b5486a0b51ae4df43826d2ab42aa7ad740d690ce9fd4bb1d72953586d85a42af95c031689035ab9a431cf16f2e919970cbf7b5e83f9bbb4bf18d4b8191df8afed63f50f91cf5c1992a3b2fa7c90c6927f451498e10e25eac11d1415dd9c86922d9fcc522518f7047de96ca888bdf9"}, {0x38, 0x0, 0x0, "b5e351f6b6d27ad50ae44b0d47fda383d00e2e41e9179d753425cb4d3c33af326c"}, {0x630, 0x0, 0x0, "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"}], 0x808}, 0x0) 23:09:40 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000015c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001480)='p', &(0x7f0000001500)}, 0x48) 23:09:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x1, &(0x7f0000000180)=@raw=[@jmp], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 23:09:40 executing program 5: socketpair(0x29, 0x0, 0x0, &(0x7f0000000000)) 23:09:40 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000015c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000001480)='p', &(0x7f0000001500)="c1"}, 0x48) 23:09:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:40 executing program 3: 23:09:40 executing program 1: 23:09:40 executing program 4: 23:09:40 executing program 2: 23:09:40 executing program 3: 23:09:40 executing program 5: 23:09:40 executing program 1: 23:09:40 executing program 4: 23:09:40 executing program 3: 23:09:40 executing program 2: 23:09:40 executing program 5: 23:09:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:40 executing program 1: 23:09:41 executing program 4: 23:09:41 executing program 5: 23:09:41 executing program 2: 23:09:41 executing program 1: 23:09:41 executing program 3: 23:09:41 executing program 4: 23:09:41 executing program 2: 23:09:41 executing program 3: 23:09:41 executing program 5: 23:09:41 executing program 1: 23:09:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:41 executing program 4: 23:09:41 executing program 2: 23:09:41 executing program 3: 23:09:41 executing program 1: 23:09:41 executing program 5: 23:09:41 executing program 4: 23:09:41 executing program 2: 23:09:41 executing program 5: 23:09:41 executing program 3: 23:09:41 executing program 1: 23:09:42 executing program 4: 23:09:42 executing program 5: 23:09:42 executing program 2: 23:09:42 executing program 3: 23:09:42 executing program 1: 23:09:42 executing program 4: 23:09:42 executing program 2: 23:09:42 executing program 5: 23:09:42 executing program 3: 23:09:42 executing program 1: 23:09:42 executing program 5: 23:09:42 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) 23:09:42 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f00000000c0)='./file0/file0\x00'}, 0x10) 23:09:42 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x411100, 0x0) 23:09:42 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x7, &(0x7f0000000000)=@raw=[@jmp, @generic, @map, @exit, @map], &(0x7f0000000080)='GPL\x00', 0x7, 0x96, &(0x7f00000000c0)=""/150, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 23:09:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:42 executing program 5: 23:09:42 executing program 4: 23:09:42 executing program 2: 23:09:42 executing program 1: 23:09:42 executing program 3: 23:09:42 executing program 1: 23:09:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:43 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:44 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:44 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:44 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:45 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:46 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:48 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:50 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:52 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:52 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:52 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:53 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:53 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:53 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:54 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r0, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r2, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0), 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r3 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r3, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:54 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:55 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x20, 0x0, 0x8a, 0x3f, 0x0, 0x0, 0x44002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x2, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x34000}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x0, "02"}], 0x18, 0xfe80}, 0xfc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000001940)={r3}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x90, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) 23:09:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000340)='wlan1\x00\x1b\x1a\xec\xd8n\xff\xc3\x87\xe2\xa3\x80\x8a\xb2\xd9\xa8L\x06\xb5\x12\x03F\xd9\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\xea\x84\x13\xdf\xf7\xber\'\x8a\xd5W\xbb\xac%j\x9d\xeb\xba\xe6\xc4\xc4\xa9\xf5\xd5\xa1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe') r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x20, 0x0, 0x8a, 0x3f, 0x0, 0x0, 0x44002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10001, 0x2, @perf_config_ext={0x0, 0x200000}, 0x0, 0x0, 0x0, 0x0, 0x20}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x34000}], 0x1, &(0x7f0000000380)=[{0x18, 0x84, 0x0, "02"}], 0x18, 0xfe80}, 0xfc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000001940)={r3}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x90, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r4}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) 23:09:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:55 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:56 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:57 executing program 2 (fault-call:0 fault-nth:0): bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) [ 204.108052][T11219] FAULT_INJECTION: forcing a failure. [ 204.108052][T11219] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 204.205288][T11219] CPU: 1 PID: 11219 Comm: syz-executor.2 Not tainted 5.10.0-rc5-syzkaller #0 [ 204.214136][T11219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.224207][T11219] Call Trace: [ 204.227553][T11219] dump_stack+0x107/0x163 [ 204.231920][T11219] should_fail.cold+0x5/0xa [ 204.236457][T11219] _copy_from_user+0x2c/0x180 [ 204.241169][T11219] __do_sys_bpf+0x156/0x5180 [ 204.245793][T11219] ? bpf_link_get_from_fd+0x110/0x110 23:09:57 executing program 1: sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000580)={'vlan0\x00'}) [ 204.251224][T11219] ? __mutex_unlock_slowpath+0xe2/0x610 [ 204.256841][T11219] ? wait_for_completion+0x260/0x260 [ 204.262195][T11219] ? syscall_enter_from_user_mode+0x1d/0x50 [ 204.268127][T11219] do_syscall_64+0x2d/0x70 [ 204.272604][T11219] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 204.278525][T11219] RIP: 0033:0x45deb9 [ 204.282646][T11219] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:09:57 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000240), 0x7}, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xffffffff, @dev={0xfe, 0x80, [], 0x37}, 0x3}, 0x80, 0x0}, 0x20008041) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f0000000400), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/time_for_children\x00') sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socketpair(0x12, 0x4, 0x8, &(0x7f0000000280)) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000000)=r1, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x12, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 23:09:57 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) [ 204.303459][T11219] RSP: 002b:00007faf7901cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 204.312951][T11219] RAX: ffffffffffffffda RBX: 0000000000001a40 RCX: 000000000045deb9 [ 204.321317][T11219] RDX: 0000000000000040 RSI: 0000000020000000 RDI: 0000000000000000 [ 204.329317][T11219] RBP: 00007faf7901cca0 R08: 0000000000000000 R09: 0000000000000000 [ 204.337416][T11219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 204.345418][T11219] R13: 00007fff95ede0bf R14: 00007faf7901d9c0 R15: 000000000118bf2c 23:09:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff0e5, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', r2}, 0x10) socket$kcm(0x10, 0x2, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x139}, 0x48) socket$kcm(0x11, 0xa, 0x300) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r4 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x3e, &(0x7f00000002c0)=r3, 0x4) sendmsg$kcm(r4, &(0x7f0000000080)={&(0x7f0000000380)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x800000}, 0x80, 0x0}, 0xfd10) write$cgroup_subtree(r4, &(0x7f0000000280)={[{0x0, 'memory', 0xc}]}, 0xfdef) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) 23:09:58 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000240), 0x7}, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xffffffff, @dev={0xfe, 0x80, [], 0x37}, 0x3}, 0x80, 0x0}, 0x20008041) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f0000000400), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/time_for_children\x00') sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socketpair(0x12, 0x4, 0x8, &(0x7f0000000280)) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000000)=r1, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x12, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 23:09:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x50}]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[], 0x1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x9, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xaf}, [@generic={0x3, 0x5, 0x8, 0x9, 0xacd}, @alu={0x7, 0x1, 0x1, 0x7, 0x2, 0x2, 0x8}, @call={0x85, 0x0, 0x0, 0x4d}, @ldst={0x2, 0x1, 0x0, 0x3, 0x0, 0x18, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @alu={0x4, 0x1, 0x1, 0xa, 0x2, 0x0, 0x10}]}, &(0x7f00000001c0)='syzkaller\x00', 0xac2, 0xde, &(0x7f0000000300)=""/222, 0x41100, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x8, 0x8001, 0x1000}, 0x10}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000180)='cq_alloc\x00', r2}, 0xffffffffffffff99) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 23:09:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x36) r1 = socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local, 0x2}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000000)=[{0x18, 0x84, 0x7, "7f"}], 0x18}, 0xfc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 23:09:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x5, 0x6000000000000}, 0x0, 0xffff, 0xf414, 0x0, 0x0, 0x1, 0x101}, 0x0, 0x2, 0xffffffffffffffff, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000bc0)=@xdp, 0x80, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000d80)}], 0x2, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], 0x178}, 0x80) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 23:09:59 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000240), 0x7}, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xffffffff, @dev={0xfe, 0x80, [], 0x37}, 0x3}, 0x80, 0x0}, 0x20008041) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f0000000400), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/time_for_children\x00') sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socketpair(0x12, 0x4, 0x8, &(0x7f0000000280)) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000000)=r1, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x12, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 23:09:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:09:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:09:59 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xf6, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x36) r1 = socket$kcm(0xa, 0x5, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local, 0x2}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000440)="c4", 0x1}], 0x1, &(0x7f0000000000)=[{0x18, 0x84, 0x7, "7f"}], 0x18}, 0xfc) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 23:09:59 executing program 2: bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:09:59 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:00 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x22005, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000240), 0x7}, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0xffffffff, @dev={0xfe, 0x80, [], 0x37}, 0x3}, 0x80, 0x0}, 0x20008041) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x26e1, 0x0) r2 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0xf, &(0x7f0000000400), 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/time_for_children\x00') sendmsg$inet(r2, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socketpair(0x12, 0x4, 0x8, &(0x7f0000000280)) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f0000000000)=r1, 0x4) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@cgroup, 0xffffffffffffffff, 0x12, 0x1}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f00000002c0)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r3 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x890b, &(0x7f0000000000)) 23:10:00 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:10:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:10:00 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x5, 0x6000000000000}, 0x0, 0xffff, 0xf414, 0x0, 0x0, 0x1, 0x101}, 0x0, 0x2, 0xffffffffffffffff, 0x8) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000bc0)=@xdp, 0x80, &(0x7f0000000e00)=[{0x0}, {&(0x7f0000000d80)}], 0x2, &(0x7f0000001180)=ANY=[@ANYBLOB="a00000000000000019010000000000003791aad856a0aac28ff166aea88a00daf2709ef7c038d06a4c76c0fd395eddee0da54efa89afc1a4f619e581dc37b6165a68c38f71568658511399c82a9a7c1c3bbbdb505f86f4ce847152b527316b92bc1b06db54dd3a05ef8f74f1c8639ff60735eb064fd9b6db147c43fd9e4d1671d5581a5bea5500739ed3ea6bec11ebb1ee272667af08a666311235250000000010000000000000000000000000000000b80000000000000000000000000200004af4b0bb2031fbe7b4216efc348bcf7ef9f99094121735fb395aa7f5287e1bae71073d32749238e5e53f20d5e86fd142358b0861341c5e500e4e1a0c66afb865bb5ba2a23b36e9a44c68a945e4a8778ab798a39d704e657d24c7d16eee97a4eb978309bb181e6fef5b0a6d74b255fc25544cf3bfcbaf2a340e94340ee812a11d9a84ffe3a84dd8068c0c35d1b61b6f25e31bb9c2e640f5b06b3bb1f2ffb2c389e393f67ab00001f0c91dcca3000010000000000000000000"], 0x178}, 0x80) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xf, 0x8, &(0x7f0000001640)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b6c4a000000002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe7d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83186c1526af6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af930cd6db49a47613808bad959719c0000000000378a921c7f7f8433c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f9360984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb503b4c5121dded93115f5ba8b208667228ca302d556eb2001bfcdf0fba229a80b82b8004754c766f62db0d495b0c2654521606aee1ad02f0171ce44ac1b5e396878f8fe40d6a661bc5b2cacaf6365785e77b812008bcad951982c7a49af7d607381299da4466acfeacc43627a2e0cd51f072ed"], &(0x7f0000000100)='GPL\x00'}, 0x48) 23:10:00 executing program 2: bpf$MAP_CREATE(0x4, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:00 executing program 2: bpf$MAP_CREATE(0x5, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:10:01 executing program 2: bpf$MAP_CREATE(0x6, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) 23:10:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2ea400001b00056bd25980648c69940d0124fc600c0006400a0000480200000037153e370948018002000000d1bd", 0x33fe0}], 0x1}, 0x7a000000) 23:10:01 executing program 2: bpf$MAP_CREATE(0x7, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) [ 208.144655][T11348] netlink: 36566 bytes leftover after parsing attributes in process `syz-executor.1'. 23:10:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:01 executing program 2: bpf$MAP_CREATE(0x8, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) [ 208.487257][T11348] netlink: 36566 bytes leftover after parsing attributes in process `syz-executor.1'. 23:10:02 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000003c0), 0x12) recvmsg$kcm(r0, &(0x7f000000f380)={&(0x7f000000f140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000f300)=[{&(0x7f000000f1c0)=""/26, 0x1a}, {&(0x7f000000f200)=""/11, 0xb}, {&(0x7f000000f240)=""/179, 0xb3}], 0x3, &(0x7f000000f340)=""/21, 0x15}, 0x2001) sendmsg$kcm(r0, &(0x7f0000010bc0)={&(0x7f000000f3c0)=@can={0x1d, r1}, 0x80, &(0x7f000000f880)=[{&(0x7f000000f640)="38a4ed66057ae4758de13155ecc9904a4b81a76eb83c15cf1ff4341004cdda5fed6e5dbc736fbcc18bb8ed163708b842a5d6fe5ee84bdd08ccc52363d45c91932b87314c942585eb95ac265379c40a017e756ed1a165b0813fd144", 0x5b}, {&(0x7f000000f7c0)}], 0x2, &(0x7f000000f900)=[{0x50, 0x114, 0x0, "5af2612dd0597d3992d9e821260977cd4272e52b7b1a3484081421840b1a152d4882934a05cf3c140f700ae015643d01287841501dd29111fc6093210a03"}, {0x10, 0x0, 0x3}, {0xf8, 0x0, 0x4, "55481c6b24534aad627aaa300b46b3af91e80c7292466463347ca6d8b9fd3409a984e74c6840981698fd9b14ac0a178cfecf23e18783ab6886fb701acefb02192dc082e86a4752d04335e39cffce5edcd338f6ab4849f442d113ca526f378fdd4598e0324ec6320cb549ec98b3f940bdfaf01d970662049056eaada4646b0d8f82159fae2ae766e24d58adc2ac1ced4d3e3751d8fc1d1bf99985ffa8c727bdddb074474d92ed824ed67da3c092db0c78fe098f914deda998fc95cea09a147c3a87a1bc15701acba27576f0cde2e3c74ed2398246910d7fd852a3c49caee09cef45d3"}, {0xef0, 0x0, 0x0, "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"}], 0x1048}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xc, 0x7f5, 0x8, 0x3, 0x602, 0xffffffffffffffff, 0x7f, [], r1, 0xffffffffffffffff, 0x5, 0x4, 0x1}, 0x40) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305829, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0xaf, 0xa0000000, 0x3, 0x0, r2, 0xffffffff, [], 0x0, r3, 0x3, 0x0, 0x3}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x8, 0xe, &(0x7f0000000600)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x200080, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x20}, 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x18000000000002e0, 0x69, 0x20000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 23:10:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="2ea400001b00056bd25980648c69940d0124fc600c0006400a0000480200000037153e370948018002000000d1bd", 0x33fe0}], 0x1}, 0x7a000000) 23:10:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x800, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x8, 0x5}, 0x0, 0x0, &(0x7f0000000300)={0x5, 0xf, 0x4, 0x1}, &(0x7f0000000340)=0x8f3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0xffffffffffffffff}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@cgroup, 0xffffffffffffffff, 0xa}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="00fdcbea73991eb34c6726db1b411cb28764c103d7a9bbe6180de6a6c9b61758021947"], 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020a00}, 0x6d70) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 23:10:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:02 executing program 2: bpf$MAP_CREATE(0x9, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) [ 208.858545][T11368] netlink: 36566 bytes leftover after parsing attributes in process `syz-executor.1'. 23:10:02 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) r2 = openat$cgroup_ro(r1, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001a80)={r2}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000001680)=ANY=[@ANYRESDEC], &(0x7f0000001300)=""/121, 0xd0, 0x79, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r2, 0x10, &(0x7f0000000380)={&(0x7f0000000300)=""/104, 0x68, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="0e20b07fa7f8ae2457bd486eacb7c360918464e56ec096280f230432f8b3090d1bf5c7060000000000000000000000000000dc5eb8fc0080000049fe399844b40e8a05cea1533df9cfb600000000663dc8f5d65b9cc44a00d973f6cbf7cc2fbac426b44540f71593b14f2a6400ff00000000000000", @ANYRES32=r3, @ANYRESOCT=r2], &(0x7f0000001380)='syzkaller\x00', 0x8000, 0xff5, &(0x7f0000001ac0)=""/4085, 0x41000, 0x14, [], 0x0, 0x13, r4, 0x8, &(0x7f0000000400)={0xfffffffc, 0x6}, 0x8, 0x10, &(0x7f0000001500)={0x4, 0xf, 0x2, 0x3f}, 0x10, r5}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r6 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r6, 0x29, 0x24, &(0x7f00000000c0), 0x4) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000003800)=[{&(0x7f0000000a80)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff02000000000000000000000000002f000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x900) [ 208.973978][T11367] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:10:02 executing program 2: bpf$MAP_CREATE(0xa, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0xa4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x40c, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) write$cgroup_int(r1, &(0x7f0000000180), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x400007) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0x1) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=r1, r2, 0x11}, 0x10) 23:10:02 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) [ 209.183952][T11367] team0: Device ipvlan0 failed to register rx_handler 23:10:02 executing program 2: bpf$MAP_CREATE(0xb, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:03 executing program 2: bpf$MAP_CREATE(0xc, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x800, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x8, 0x5}, 0x0, 0x0, &(0x7f0000000300)={0x5, 0xf, 0x4, 0x1}, &(0x7f0000000340)=0x8f3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0xffffffffffffffff}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@cgroup, 0xffffffffffffffff, 0xa}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="00fdcbea73991eb34c6726db1b411cb28764c103d7a9bbe6180de6a6c9b61758021947"], 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020a00}, 0x6d70) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 23:10:03 executing program 2: bpf$MAP_CREATE(0xd, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:03 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:03 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f0000000040)='syz1\x00', 0x1ff) r2 = openat$cgroup_ro(r1, &(0x7f0000001640)='cgroup.stat\x00', 0x7a05, 0x1700) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000001a80)={r2}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000001680)=ANY=[@ANYRESDEC], &(0x7f0000001300)=""/121, 0xd0, 0x79, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r2, 0x10, &(0x7f0000000380)={&(0x7f0000000300)=""/104, 0x68, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f00000004c0)=ANY=[@ANYBLOB="0e20b07fa7f8ae2457bd486eacb7c360918464e56ec096280f230432f8b3090d1bf5c7060000000000000000000000000000dc5eb8fc0080000049fe399844b40e8a05cea1533df9cfb600000000663dc8f5d65b9cc44a00d973f6cbf7cc2fbac426b44540f71593b14f2a6400ff00000000000000", @ANYRES32=r3, @ANYRESOCT=r2], &(0x7f0000001380)='syzkaller\x00', 0x8000, 0xff5, &(0x7f0000001ac0)=""/4085, 0x41000, 0x14, [], 0x0, 0x13, r4, 0x8, &(0x7f0000000400)={0xfffffffc, 0x6}, 0x8, 0x10, &(0x7f0000001500)={0x4, 0xf, 0x2, 0x3f}, 0x10, r5}, 0x78) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r5, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r6 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r6, 0x29, 0x24, &(0x7f00000000c0), 0x4) socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000003800)=[{&(0x7f0000000a80)="f4001100002b2c25e994efd18498d66205baa68754a3f5ffffff02000000000000000000000000002f000000000000009d91409707a79498161c761a92f8f2e08d4af9a4f4ef306152c4355570b2f188fe398d", 0x53}], 0x1}, 0x900) [ 210.504096][T11367] syz-executor.5 (11367) used greatest stack depth: 22136 bytes left 23:10:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:04 executing program 2: bpf$MAP_CREATE(0xe, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:04 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) [ 211.024069][T11418] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 23:10:04 executing program 2: bpf$MAP_CREATE(0xf, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) [ 211.473377][T11418] team0: Device ipvlan0 failed to register rx_handler 23:10:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:05 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:05 executing program 2: bpf$MAP_CREATE(0x10, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x1) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x800, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x8, 0x5}, 0x0, 0x0, &(0x7f0000000300)={0x5, 0xf, 0x4, 0x1}, &(0x7f0000000340)=0x8f3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=0xffffffffffffffff}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000004c0)={@cgroup, 0xffffffffffffffff, 0xa}, 0x10) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40305829, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x4) r3 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="00fdcbea73991eb34c6726db1b411cb28764c103d7a9bbe6180de6a6c9b61758021947"], 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r5, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) sendmsg$kcm(r5, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020a00}, 0x6d70) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188120f80ecdb4cb9cca7480ef43b000000e3bd6efb440e09000e000a0010000000028000001201", 0x2e}], 0x1}, 0x0) 23:10:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:06 executing program 2: bpf$MAP_CREATE(0x11, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) [ 212.683152][T11456] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 23:10:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) [ 213.059728][T11456] team0: Device ipvlan0 failed to register rx_handler 23:10:06 executing program 2: bpf$MAP_CREATE(0x12, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) socket$kcm(0xa, 0x5, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:06 executing program 2: bpf$MAP_CREATE(0x13, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:07 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:07 executing program 2: bpf$MAP_CREATE(0x14, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='devices.list\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x44, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2a8, &(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x2, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x5, 0x5}, 0x0, 0x0, &(0x7f00000001c0)={0x5, 0xb, 0x5, 0x8}, &(0x7f0000000200)=0x81, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=0x9}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)={r1}, 0x4) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1004, 0x0, 0x0, 0x2, 0x2, 0x0, 0x20}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000000)='freezer.state\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) 23:10:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:07 executing program 2: bpf$MAP_CREATE(0x15, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:07 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:07 executing program 5: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8ac7, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cgroup.max.descendants\x00', 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) write$cgroup_int(r1, &(0x7f0000000180), 0x12) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000240)=@framed={{}, [@exit]}, &(0x7f0000000280)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0xa, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x0, 0x8, 0x1}, 0x10}, 0x78) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000340)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000004c0)={@map=r1, r2, 0x1, 0x1, r3}, 0x14) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x57, &(0x7f0000000200)) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='net_cls.classid\x00', 0x2, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r4, r0}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r5, r4, 0x4, r4}, 0x10) 23:10:08 executing program 2: bpf$MAP_CREATE(0x16, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:08 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:08 executing program 2: bpf$MAP_CREATE(0x17, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100), 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:08 executing program 2: bpf$MAP_CREATE(0x18, &(0x7f0000000000)={0x1, 0x3, 0x3, 0xf492, 0x4, 0x1}, 0x40) 23:10:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380), 0x4) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:09 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000000)="01bf13cb5c83a3"}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x14}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0x573f, 0x8000, 0x1, 0x21, r2, 0x0, [], 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0x40) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup/syz0\x00', 0x1ff) sendmsg$inet(r3, &(0x7f0000000180)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x131090c118133b91, 0x0, 0x4, 0x0}, 0x20) sendmsg$kcm(r3, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x1}, 0x6d70) r4 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r4, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @loopback, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000004c0)="c4", 0x1}], 0x1}, 0x40048f8) recvmsg$kcm(0xffffffffffffffff, &(0x7f000001a8c0)={&(0x7f0000000600)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f000001a4c0)=""/201, 0xc9}, {&(0x7f000001a5c0)=""/159, 0x9f}, {&(0x7f00000003c0)=""/86, 0x56}, {&(0x7f0000000700)=""/68, 0x44}, {&(0x7f0000000780)=""/219, 0xdb}], 0x7, &(0x7f00000001c0)=""/13, 0xd}, 0x40000000) 23:10:09 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x79, 0x12, 0xb0}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getpid() r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/time\x00') ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000300)={'veth0_to_bond\x00'}) perf_event_open(0x0, 0x0, 0x0, r1, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x10001, 0x1}) 23:10:09 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000940), 0x9}, 0x0, 0x7c4, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11110, 0x10000, 0x0, 0xd}, 0x0, 0xf, 0xffffffffffffffff, 0x7) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000700)={&(0x7f0000000000)={0x2, 0x3ffe, @remote}, 0x10, 0x0}, 0x24048844) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x7, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xffffffff}, [@jmp={0x5, 0x0, 0x0, 0x2, 0xa, 0x1}, @call={0x85, 0x0, 0x0, 0xf}, @map_val={0x18, 0xb, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x4, 0x0, 0x5, 0x3778}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) sendmsg$inet(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x2, 0x4e22, @private=0xa010102}, 0x10, &(0x7f00000018c0)=[{&(0x7f0000000380)="7f860b0d26554408053c2f3f4be5bf1161a6ebbe34aa04206f57c398832a35acbc6c174674198c2741b7a8921ef01888d466993a66b2fe97c8ff673293273857923a13afe18f97bf83345fa0822bf3efeb510f9fe7b8dc301969e35f262b1284e8ee94ca5bbad95595107d82f0e8132ba892a8355f6b9e15df1990aeb204fd306481d1f37617d1fa5f3e87c662677dcc8d61ff5306b7e3fd08d6f2bc529f7fbe72ee9184cb", 0xa5}, {&(0x7f00000002c0)="82c32307f3fb8586e56a018154e7236669bcaa379b", 0x15}, {&(0x7f0000000740)="780756ef15458bfe417896de6c24ba606937b6c90586afd94b5a1a453cc5539797f1cacaad1b82cc07608c015cfe4b49c78e9bcfcb81cf5d155a940eb94cd355b9689fc08e04e703000000a680d2f63f7cbd336b05b444e14e1d3de282a008840dd893ec4d5d160dafbf219c29dbf7b06ed434cf71c0f86ee7e5bb655e3737c4e8a8b28733ec9e2f8058118f123e35ef473d3d728b81a9ca1558c6f492735fc0af6c914c164d9fe949b4c895d965c18c96e419e8ef6d6735d6fd3b9f7448e91c27587859bc71db640ea83088c12e786f78", 0xd1}, {&(0x7f0000001780)="4626526bf417c9d4afea640741493edccba009bc5d70ba73e28812dba315374ab5a1c0b70af7ffff00a6c3457538e38cd07e2aeb3f0a9ade5f5cef6d5e0b5b235dafc662dccebb9fa5964d9ad8b420b2fd0a40125bd73def1d8ca559b83f0a8706892fa8f500de1c7b7dd6aaef1329676ed22f31dda10e02", 0x78}, {&(0x7f0000001800)="3777c34f226af113365d7edf97131f205b1e5106f51c8b95db07492ceb194665678271c57ab689027063178026e190be14ef34379d70504c2fd872f648c11fa3c26db4ed6df0c88bb37c3fc924d7f2d319acaf902643d0c4bc42565f9e01d5f6b6b7568681700d68ac0086026714236a076527beaf4d02fc8c635954964b4cdb10557eeab36c6b536bfbcd2b64e762b0a46367a6b687e60d0b47", 0x9a}], 0x5, &(0x7f00000029c0)=ANY=[@ANYBLOB="00000000005f7ce8b5db03173d8f8ce05cb0db9c40c5348fd4b3c4407977118f321913e3de0fce8e5279c6a4a8dfe284ec6d7b140115f8c3fcf2472ff3c249babc2aae6cfd52ad1200000000000062d5763743748cc6661d2edefec3194a112b95b0f07758f36ef8167650c61c64b7aeb55fde98cf5910ebff23fa0cdb944b232c87c09f315e48a7f5c499d61bf587", @ANYRES32=0x0, @ANYBLOB="ac1414aaac1e000100000000d000000000000000000000000700000083124be75550c3cc46e27b0e9eb5ad899b84443472d3000000000000cba164010101000000056401010200000000ffffffff00000401ac1414bb000000400a010102000010008927e700000000ffffffffac1e0101a8ef1d834a8cb7392551153f60498509ac1414bb00000000ac1414bbe000000264010102ffffd1655db92fb8ffff820f1698b916237da84867e59a7527940401008808b9241c1c04e8890f2b7f000001ffffffffac1e00018327bb0a010101ac1414bbe000000164010101e0000002ac1414bbac1414aa640101020a010102000011000000000000000000000001000000010000000000000011000000000000000000000001000000af000000000008001c000000a51fff4f843a29bbda000000000000000008000000b0c52e84d00da8d1f2f44aad0e65fa790315cba05e693e5143b12fa60623f7087bf6be61b12b20dad0f17300cbeb61d4b307b5603e5bbe1ab042adf64e7814a8e0278d96ea9c67fb515bc9a2725522f0cfb82ef0e7006137d6a5b86840f07226bd88b8099e0471107ae2b4109b362d6c35638b2e4b89504d733d927010b3b92665028e16ef7fc3e210ecfdda09be65b8f48354918629b78864a478eda0c3dadc420946a39a84a8f3342ecc11ce5eee88523e385b84675a5ffe10bb84a8f244fe44c1ffcb4565cedfa336a1081cc472029b1e76c52c4839a1db10a0c7e42b57c7a29b5662cd0beacdee91f82619113e8738911b24a595956db21a64ecb831e2eb66e122139698b617648b1f6058fd62016ed01b0d0bf8f2678ae70eb9eaf9b39051ce536eda0db10ef62b00d0d1ff8159aa000340a954af0aac85996fc4e65be98aa7746f88ed0674f01607823d3f80a594c210e587c1a1eb5a4ee5261a769723a43793e05c5d8430070bee4e515e2eda38f6d005000000009138c05a94e3415a537402073f1b7498451177ce4a4cd93ad01a10413f9a34d3f9153b56c78b5622f7d78c92700adde4d3653c98ea33809410d9d239dbafc403db4f67a47d2ca2494cf7b9b446b67f744aebe0e96cd8d800000000000000ebef3ce6db", @ANYRES32=0x0, @ANYBLOB="0880bbefa458fdda8c3f7b19be3b00000000000000000002e335d65a5afab1f3e47444dac7215f4213380adbeece7ad6329634b5721cfab161eac144eb8e78deb61f622331ee357aa80c43d9cffce6e08cb6ee2a21e96c220532187ac89130c5a5bb4ebc8d8f0ca46d8e10ac1cfea5fd8d35b41b9c298c9d69090170f2975fffff985519"], 0x140}, 0x8818) recvmsg$kcm(r2, &(0x7f0000005340)={&(0x7f0000005040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005240)=[{&(0x7f00000050c0)=""/85, 0x55}, {&(0x7f0000005180)=""/165, 0xa5}], 0x2, &(0x7f0000005280)=""/129, 0x81}, 0x42) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000005380)=r5) socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001740)={&(0x7f0000000a00)="c70e1249e1e8a92daf5fc5873622e258198c4f332cdd80c0bad0975f4f626a169fe67469938954ba150936ce9cdf4360a80d308f0afae649dea93e0ea56dbb3882bbbc5d86caa53cab0480dc85c6541beb6f15b2044e2154f7260c52de0f0b610e557aa5907181cc183531bc7dad23bc49c76e60952a99c6f0eec1285b272da376b6f9b82c6d35ed756ad99327a36eb9a7cec5f7f5748ac663ad2c1ade9aea0116bb9e35c072fd759b5395ed32e8e4dbbeb9e8df180555d2ba52c3232c5c", &(0x7f0000000640)=""/149, &(0x7f0000001940)="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", &(0x7f0000000980), 0xd}, 0x38) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x7, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xffffffff}, [@jmp={0x5, 0x0, 0x0, 0x2, 0xa, 0x1}, @call={0x85, 0x0, 0x0, 0xf}, @map_val={0x18, 0xb, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x4, 0x0, 0x5, 0x3778}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) sendmsg$inet(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x2, 0x4e22, @private=0xa010102}, 0x10, &(0x7f00000018c0)=[{&(0x7f0000000380)="7f860b0d26554408053c2f3f4be5bf1161a6ebbe34aa04206f57c398832a35acbc6c174674198c2741b7a8921ef01888d466993a66b2fe97c8ff673293273857923a13afe18f97bf83345fa0822bf3efeb510f9fe7b8dc301969e35f262b1284e8ee94ca5bbad95595107d82f0e8132ba892a8355f6b9e15df1990aeb204fd306481d1f37617d1fa5f3e87c662677dcc8d61ff5306b7e3fd08d6f2bc529f7fbe72ee9184cb", 0xa5}, {&(0x7f00000002c0)="82c32307f3fb8586e56a018154e7236669bcaa379b", 0x15}, {&(0x7f0000000740)="780756ef15458bfe417896de6c24ba606937b6c90586afd94b5a1a453cc5539797f1cacaad1b82cc07608c015cfe4b49c78e9bcfcb81cf5d155a940eb94cd355b9689fc08e04e703000000a680d2f63f7cbd336b05b444e14e1d3de282a008840dd893ec4d5d160dafbf219c29dbf7b06ed434cf71c0f86ee7e5bb655e3737c4e8a8b28733ec9e2f8058118f123e35ef473d3d728b81a9ca1558c6f492735fc0af6c914c164d9fe949b4c895d965c18c96e419e8ef6d6735d6fd3b9f7448e91c27587859bc71db640ea83088c12e786f78", 0xd1}, {&(0x7f0000001780)="4626526bf417c9d4afea640741493edccba009bc5d70ba73e28812dba315374ab5a1c0b70af7ffff00a6c3457538e38cd07e2aeb3f0a9ade5f5cef6d5e0b5b235dafc662dccebb9fa5964d9ad8b420b2fd0a40125bd73def1d8ca559b83f0a8706892fa8f500de1c7b7dd6aaef1329676ed22f31dda10e02", 0x78}, {&(0x7f0000001800)="3777c34f226af113365d7edf97131f205b1e5106f51c8b95db07492ceb194665678271c57ab689027063178026e190be14ef34379d70504c2fd872f648c11fa3c26db4ed6df0c88bb37c3fc924d7f2d319acaf902643d0c4bc42565f9e01d5f6b6b7568681700d68ac0086026714236a076527beaf4d02fc8c635954964b4cdb10557eeab36c6b536bfbcd2b64e762b0a46367a6b687e60d0b47", 0x9a}], 0x5, &(0x7f00000029c0)=ANY=[@ANYBLOB="00000000005f7ce8b5db03173d8f8ce05cb0db9c40c5348fd4b3c4407977118f321913e3de0fce8e5279c6a4a8dfe284ec6d7b140115f8c3fcf2472ff3c249babc2aae6cfd52ad1200000000000062d5763743748cc6661d2edefec3194a112b95b0f07758f36ef8167650c61c64b7aeb55fde98cf5910ebff23fa0cdb944b232c87c09f315e48a7f5c499d61bf587", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0880bbefa458fdda8c3f7b19be3b00000000000000000002e335d65a5afab1f3e47444dac7215f4213380adbeece7ad6329634b5721cfab161eac144eb8e78deb61f622331ee357aa80c43d9cffce6e08cb6ee2a21e96c220532187ac89130c5a5bb4ebc8d8f0ca46d8e10ac1cfea5fd8d35b41b9c298c9d69090170f2975fffff985519"], 0x140}, 0x8818) recvmsg$kcm(r2, &(0x7f0000005340)={&(0x7f0000005040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005240)=[{&(0x7f00000050c0)=""/85, 0x55}, {&(0x7f0000005180)=""/165, 0xa5}], 0x2, &(0x7f0000005280)=""/129, 0x81}, 0x42) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000005380)=r5) socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001740)={&(0x7f0000000a00)="c70e1249e1e8a92daf5fc5873622e258198c4f332cdd80c0bad0975f4f626a169fe67469938954ba150936ce9cdf4360a80d308f0afae649dea93e0ea56dbb3882bbbc5d86caa53cab0480dc85c6541beb6f15b2044e2154f7260c52de0f0b610e557aa5907181cc183531bc7dad23bc49c76e60952a99c6f0eec1285b272da376b6f9b82c6d35ed756ad99327a36eb9a7cec5f7f5748ac663ad2c1ade9aea0116bb9e35c072fd759b5395ed32e8e4dbbeb9e8df180555d2ba52c3232c5c", &(0x7f0000000640)=""/149, &(0x7f0000001940)="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", &(0x7f0000000980), 0xd}, 0x38) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x7, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xffffffff}, [@jmp={0x5, 0x0, 0x0, 0x2, 0xa, 0x1}, @call={0x85, 0x0, 0x0, 0xf}, @map_val={0x18, 0xb, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x4, 0x0, 0x5, 0x3778}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) sendmsg$inet(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x2, 0x4e22, @private=0xa010102}, 0x10, &(0x7f00000018c0)=[{&(0x7f0000000380)="7f860b0d26554408053c2f3f4be5bf1161a6ebbe34aa04206f57c398832a35acbc6c174674198c2741b7a8921ef01888d466993a66b2fe97c8ff673293273857923a13afe18f97bf83345fa0822bf3efeb510f9fe7b8dc301969e35f262b1284e8ee94ca5bbad95595107d82f0e8132ba892a8355f6b9e15df1990aeb204fd306481d1f37617d1fa5f3e87c662677dcc8d61ff5306b7e3fd08d6f2bc529f7fbe72ee9184cb", 0xa5}, {&(0x7f00000002c0)="82c32307f3fb8586e56a018154e7236669bcaa379b", 0x15}, {&(0x7f0000000740)="780756ef15458bfe417896de6c24ba606937b6c90586afd94b5a1a453cc5539797f1cacaad1b82cc07608c015cfe4b49c78e9bcfcb81cf5d155a940eb94cd355b9689fc08e04e703000000a680d2f63f7cbd336b05b444e14e1d3de282a008840dd893ec4d5d160dafbf219c29dbf7b06ed434cf71c0f86ee7e5bb655e3737c4e8a8b28733ec9e2f8058118f123e35ef473d3d728b81a9ca1558c6f492735fc0af6c914c164d9fe949b4c895d965c18c96e419e8ef6d6735d6fd3b9f7448e91c27587859bc71db640ea83088c12e786f78", 0xd1}, {&(0x7f0000001780)="4626526bf417c9d4afea640741493edccba009bc5d70ba73e28812dba315374ab5a1c0b70af7ffff00a6c3457538e38cd07e2aeb3f0a9ade5f5cef6d5e0b5b235dafc662dccebb9fa5964d9ad8b420b2fd0a40125bd73def1d8ca559b83f0a8706892fa8f500de1c7b7dd6aaef1329676ed22f31dda10e02", 0x78}, {&(0x7f0000001800)="3777c34f226af113365d7edf97131f205b1e5106f51c8b95db07492ceb194665678271c57ab689027063178026e190be14ef34379d70504c2fd872f648c11fa3c26db4ed6df0c88bb37c3fc924d7f2d319acaf902643d0c4bc42565f9e01d5f6b6b7568681700d68ac0086026714236a076527beaf4d02fc8c635954964b4cdb10557eeab36c6b536bfbcd2b64e762b0a46367a6b687e60d0b47", 0x9a}], 0x5, &(0x7f00000029c0)=ANY=[@ANYBLOB="00000000005f7ce8b5db03173d8f8ce05cb0db9c40c5348fd4b3c4407977118f321913e3de0fce8e5279c6a4a8dfe284ec6d7b140115f8c3fcf2472ff3c249babc2aae6cfd52ad1200000000000062d5763743748cc6661d2edefec3194a112b95b0f07758f36ef8167650c61c64b7aeb55fde98cf5910ebff23fa0cdb944b232c87c09f315e48a7f5c499d61bf587", @ANYRES32=0x0, @ANYBLOB="ac1414aaac1e000100000000d000000000000000000000000700000083124be75550c3cc46e27b0e9eb5ad899b84443472d3000000000000cba164010101000000056401010200000000ffffffff00000401ac1414bb000000400a010102000010008927e700000000ffffffffac1e0101a8ef1d834a8cb7392551153f60498509ac1414bb00000000ac1414bbe000000264010102ffffd1655db92fb8ffff820f1698b916237da84867e59a7527940401008808b9241c1c04e8890f2b7f000001ffffffffac1e00018327bb0a010101ac1414bbe000000164010101e0000002ac1414bbac1414aa640101020a010102000011000000000000000000000001000000010000000000000011000000000000000000000001000000af000000000008001c000000a51fff4f843a29bbda000000000000000008000000b0c52e84d00da8d1f2f44aad0e65fa790315cba05e693e5143b12fa60623f7087bf6be61b12b20dad0f17300cbeb61d4b307b5603e5bbe1ab042adf64e7814a8e0278d96ea9c67fb515bc9a2725522f0cfb82ef0e7006137d6a5b86840f07226bd88b8099e0471107ae2b4109b362d6c35638b2e4b89504d733d927010b3b92665028e16ef7fc3e210ecfdda09be65b8f48354918629b78864a478eda0c3dadc420946a39a84a8f3342ecc11ce5eee88523e385b84675a5ffe10bb84a8f244fe44c1ffcb4565cedfa336a1081cc472029b1e76c52c4839a1db10a0c7e42b57c7a29b5662cd0beacdee91f82619113e8738911b24a595956db21a64ecb831e2eb66e122139698b617648b1f6058fd62016ed01b0d0bf8f2678ae70eb9eaf9b39051ce536eda0db10ef62b00d0d1ff8159aa000340a954af0aac85996fc4e65be98aa7746f88ed0674f01607823d3f80a594c210e587c1a1eb5a4ee5261a769723a43793e05c5d8430070bee4e515e2eda38f6d005000000009138c05a94e3415a537402073f1b7498451177ce4a4cd93ad01a10413f9a34d3f9153b56c78b5622f7d78c92700adde4d3653c98ea33809410d9d239dbafc403db4f67a47d2ca2494cf7b9b446b67f744aebe0e96cd8d800000000000000ebef3ce6db", @ANYRES32=0x0, @ANYBLOB="0880bbefa458fdda8c3f7b19be3b00000000000000000002e335d65a5afab1f3e47444dac7215f4213380adbeece7ad6329634b5721cfab161eac144eb8e78deb61f622331ee357aa80c43d9cffce6e08cb6ee2a21e96c220532187ac89130c5a5bb4ebc8d8f0ca46d8e10ac1cfea5fd8d35b41b9c298c9d69090170f2975fffff985519"], 0x140}, 0x8818) recvmsg$kcm(r2, &(0x7f0000005340)={&(0x7f0000005040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005240)=[{&(0x7f00000050c0)=""/85, 0x55}, {&(0x7f0000005180)=""/165, 0xa5}], 0x2, &(0x7f0000005280)=""/129, 0x81}, 0x42) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000005380)=r5) socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001740)={&(0x7f0000000a00)="c70e1249e1e8a92daf5fc5873622e258198c4f332cdd80c0bad0975f4f626a169fe67469938954ba150936ce9cdf4360a80d308f0afae649dea93e0ea56dbb3882bbbc5d86caa53cab0480dc85c6541beb6f15b2044e2154f7260c52de0f0b610e557aa5907181cc183531bc7dad23bc49c76e60952a99c6f0eec1285b272da376b6f9b82c6d35ed756ad99327a36eb9a7cec5f7f5748ac663ad2c1ade9aea0116bb9e35c072fd759b5395ed32e8e4dbbeb9e8df180555d2ba52c3232c5c", &(0x7f0000000640)=""/149, &(0x7f0000001940)="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", &(0x7f0000000980), 0xd}, 0x38) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x7, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xffffffff}, [@jmp={0x5, 0x0, 0x0, 0x2, 0xa, 0x1}, @call={0x85, 0x0, 0x0, 0xf}, @map_val={0x18, 0xb, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x4, 0x0, 0x5, 0x3778}, 0x10, 0xffffffffffffffff}, 0x78) openat$cgroup(r3, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) sendmsg$inet(r2, &(0x7f0000000300)={&(0x7f0000000240)={0x2, 0x4e22, @private=0xa010102}, 0x10, &(0x7f00000018c0)=[{&(0x7f0000000380)="7f860b0d26554408053c2f3f4be5bf1161a6ebbe34aa04206f57c398832a35acbc6c174674198c2741b7a8921ef01888d466993a66b2fe97c8ff673293273857923a13afe18f97bf83345fa0822bf3efeb510f9fe7b8dc301969e35f262b1284e8ee94ca5bbad95595107d82f0e8132ba892a8355f6b9e15df1990aeb204fd306481d1f37617d1fa5f3e87c662677dcc8d61ff5306b7e3fd08d6f2bc529f7fbe72ee9184cb", 0xa5}, {&(0x7f00000002c0)="82c32307f3fb8586e56a018154e7236669bcaa379b", 0x15}, {&(0x7f0000000740)="780756ef15458bfe417896de6c24ba606937b6c90586afd94b5a1a453cc5539797f1cacaad1b82cc07608c015cfe4b49c78e9bcfcb81cf5d155a940eb94cd355b9689fc08e04e703000000a680d2f63f7cbd336b05b444e14e1d3de282a008840dd893ec4d5d160dafbf219c29dbf7b06ed434cf71c0f86ee7e5bb655e3737c4e8a8b28733ec9e2f8058118f123e35ef473d3d728b81a9ca1558c6f492735fc0af6c914c164d9fe949b4c895d965c18c96e419e8ef6d6735d6fd3b9f7448e91c27587859bc71db640ea83088c12e786f78", 0xd1}, {&(0x7f0000001780)="4626526bf417c9d4afea640741493edccba009bc5d70ba73e28812dba315374ab5a1c0b70af7ffff00a6c3457538e38cd07e2aeb3f0a9ade5f5cef6d5e0b5b235dafc662dccebb9fa5964d9ad8b420b2fd0a40125bd73def1d8ca559b83f0a8706892fa8f500de1c7b7dd6aaef1329676ed22f31dda10e02", 0x78}, {&(0x7f0000001800)="3777c34f226af113365d7edf97131f205b1e5106f51c8b95db07492ceb194665678271c57ab689027063178026e190be14ef34379d70504c2fd872f648c11fa3c26db4ed6df0c88bb37c3fc924d7f2d319acaf902643d0c4bc42565f9e01d5f6b6b7568681700d68ac0086026714236a076527beaf4d02fc8c635954964b4cdb10557eeab36c6b536bfbcd2b64e762b0a46367a6b687e60d0b47", 0x9a}], 0x5, &(0x7f00000029c0)=ANY=[@ANYBLOB="00000000005f7ce8b5db03173d8f8ce05cb0db9c40c5348fd4b3c4407977118f321913e3de0fce8e5279c6a4a8dfe284ec6d7b140115f8c3fcf2472ff3c249babc2aae6cfd52ad1200000000000062d5763743748cc6661d2edefec3194a112b95b0f07758f36ef8167650c61c64b7aeb55fde98cf5910ebff23fa0cdb944b232c87c09f315e48a7f5c499d61bf587", @ANYRES32=0x0, @ANYBLOB="ac1414aaac1e000100000000d000000000000000000000000700000083124be75550c3cc46e27b0e9eb5ad899b84443472d3000000000000cba164010101000000056401010200000000ffffffff00000401ac1414bb000000400a010102000010008927e700000000ffffffffac1e0101a8ef1d834a8cb7392551153f60498509ac1414bb00000000ac1414bbe000000264010102ffffd1655db92fb8ffff820f1698b916237da84867e59a7527940401008808b9241c1c04e8890f2b7f000001ffffffffac1e00018327bb0a010101ac1414bbe000000164010101e0000002ac1414bbac1414aa640101020a010102000011000000000000000000000001000000010000000000000011000000000000000000000001000000af000000000008001c000000a51fff4f843a29bbda000000000000000008000000b0c52e84d00da8d1f2f44aad0e65fa790315cba05e693e5143b12fa60623f7087bf6be61b12b20dad0f17300cbeb61d4b307b5603e5bbe1ab042adf64e7814a8e0278d96ea9c67fb515bc9a2725522f0cfb82ef0e7006137d6a5b86840f07226bd88b8099e0471107ae2b4109b362d6c35638b2e4b89504d733d927010b3b92665028e16ef7fc3e210ecfdda09be65b8f48354918629b78864a478eda0c3dadc420946a39a84a8f3342ecc11ce5eee88523e385b84675a5ffe10bb84a8f244fe44c1ffcb4565cedfa336a1081cc472029b1e76c52c4839a1db10a0c7e42b57c7a29b5662cd0beacdee91f82619113e8738911b24a595956db21a64ecb831e2eb66e122139698b617648b1f6058fd62016ed01b0d0bf8f2678ae70eb9eaf9b39051ce536eda0db10ef62b00d0d1ff8159aa000340a954af0aac85996fc4e65be98aa7746f88ed0674f01607823d3f80a594c210e587c1a1eb5a4ee5261a769723a43793e05c5d8430070bee4e515e2eda38f6d005000000009138c05a94e3415a537402073f1b7498451177ce4a4cd93ad01a10413f9a34d3f9153b56c78b5622f7d78c92700adde4d3653c98ea33809410d9d239dbafc403db4f67a47d2ca2494cf7b9b446b67f744aebe0e96cd8d800000000000000ebef3ce6db", @ANYRES32=0x0, @ANYBLOB="0880bbefa458fdda8c3f7b19be3b00000000000000000002e335d65a5afab1f3e47444dac7215f4213380adbeece7ad6329634b5721cfab161eac144eb8e78deb61f622331ee357aa80c43d9cffce6e08cb6ee2a21e96c220532187ac89130c5a5bb4ebc8d8f0ca46d8e10ac1cfea5fd8d35b41b9c298c9d69090170f2975fffff985519"], 0x140}, 0x8818) recvmsg$kcm(r2, &(0x7f0000005340)={&(0x7f0000005040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005240)=[{&(0x7f00000050c0)=""/85, 0x55}, {&(0x7f0000005180)=""/165, 0xa5}], 0x2, &(0x7f0000005280)=""/129, 0x81}, 0x42) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000580)) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000005380)=r5) socket$kcm(0xa, 0x6, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000001740)={&(0x7f0000000a00)="c70e1249e1e8a92daf5fc5873622e258198c4f332cdd80c0bad0975f4f626a169fe67469938954ba150936ce9cdf4360a80d308f0afae649dea93e0ea56dbb3882bbbc5d86caa53cab0480dc85c6541beb6f15b2044e2154f7260c52de0f0b610e557aa5907181cc183531bc7dad23bc49c76e60952a99c6f0eec1285b272da376b6f9b82c6d35ed756ad99327a36eb9a7cec5f7f5748ac663ad2c1ade9aea0116bb9e35c072fd759b5395ed32e8e4dbbeb9e8df180555d2ba52c3232c5c", &(0x7f0000000640)=""/149, &(0x7f0000001940)="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", &(0x7f0000000980), 0xd}, 0x38) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5