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", 0x1000}, {&(0x7f0000002640)="7487fa960df5b5270fd4b5405ffa66d6d1735c5f832f0e9e25592abec1f84fa4ffff33f07fcb86a13cce9c1faa05a582dacee15021bd0876e78ccfee68fc82ec3eea9cb14031a9609d33d4303f618671d89561b2ff06d6ca5e11b17ce05105e12c90ca1ab15455a24ad7e2b201feb265cf9c3eee5f6701b9b52780b1b494d2cb589fff1bc434e1c8885791b0a5f9308c0df54b12246445466dcf275bdeaf6b48e355aa931a45ed", 0xa7}], 0x7, &(0x7f0000002780)=[{0x100, 0x111, 0xcaf, "98c1b41be952d57421d1060aa3da0a35109944d15b302c44f0aee98e605dd595368616e7b71294e6cc71de84e66fb2a6dee4d7b978059b99dd4bff41b013d8da5647b8b6ad3de9fae65bce0c068b93d7c9885a583b1165d9a76a008634d447c71bf7da26212864d11ff667a8e9866f2408d885475b11a5f91dd93b04accaebf755fd6ada728d785d64c95404721fe93cfad738616409df5ddbe18f095fda57c3606d64f99ab06eee2904cb1c64b6e019002fcef8af9a6b47f7ca5fbb977ecc9027e5d72dd1269474e047b97ba094ccbe077b1612d0a32f7034cc1abd1e0f7172ac44eada50f3c1d673"}, {0xb8, 0x1, 0x7, "5164d8a9334c6af2a21ea11b44b0a1b35c8f838ff47e600c59e5725ffabef1f71f003899e26212791a2c0cae5c3c6cac0c9beba91b1ed319307a929b31c4e3dfa235024665297d43dd5263351894668189dc704a384aea5e84583b604b45be649e93aedbdfa813e4e4c1766e002a4fdd1d587dc7f636f2716a13de79e824bad84a58a5d1cb6d697c639bd2b100b277583cd9830e534322604139c8e46b890c8cd2"}, {0x20, 0x111, 0x7, "bc99c1975b0ca3bd5186d263"}], 0x1d8}, 0x4000000) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001200)={&(0x7f0000000000)="6fc90f6f21b938a905560a7adf9bbbd210d0f01b98eb60c99ce4814cefbc41c7ab0939cfbf5f5cf96dca4f103dddc3b7182ae69b6210c527f74de222a206b175c67e8a3848a7f96bc8fcd0b59c49a2888769aee4b85f7cf844f94ed112c6dfc6f63b8971c591c556089750033c142c47b23f1549d344716afdadf9f839d2ce00b976c2dd3dec5348ee94a6bb9099e99695426f09522e0f131613ba2c046dedc3cae89c01243cd4b0d984e5975b6656946fcd74", &(0x7f00000000c0)=""/40, &(0x7f0000000100)="6dd5be7508ad247f5c86d210b06a7b1dfd4b9d44a5e241321800e279686bb94bef14c5511c6913e7675dd28e86923ebb46618bf33d2ccfa40f0101ebb3abe42df53d44aa41d96e7a13fdc327ebb39070d600a0439f2cf224cd261545bec3e89090aea9bce16943d24ae363420e5b5393d58f85104536f35920f6932b5b73fb64617740a2aa0c8135358ae83e0f0482b8358baf9b8e63447e1874883abbb9c323b7ee28ec4ca8014b3115f144883fd0337e04466fe96c0ab7a21d7c44a550eff8aa302f7887a971fef76ab6a1ec043d", &(0x7f0000000200)="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", 0x1fb1}, 0x38) 09:02:03 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x89, 0x4f, &(0x7f0000000000)="e6f07aa138b28a98491a0a94564bda76107f4cb0fa13108e537ed24502a28e00f175159284f1dc47d7d7399a33d9e44429ef659a7bc0f3a9da06b9238b7800f30234a1319e23c78039764a0620b15602ded87cc073ddbab16a031188a39ea3e1fe11c64e1f13558d532bb3701b9ffa0d25f85a068c0b4ba8cb66c4628881c97f2d032ef739c8590501", &(0x7f00000000c0)=""/79, 0xda, 0x0, 0x29, 0x3a, &(0x7f0000000140)="5617ffed31f95ce8033817cfa7a41db438da666b86f1200943fb52fe4e8a75436e98455ac89c537901", &(0x7f0000000180)="11e4b9783b43e04f1ef54fc26671108a513e9edbbe6aac19082fda39838246fc54b37d6f3d692199bfb3db2db91d620faa714c36c1ff4df6543e", 0x0, 0x8000}, 0x48) recvmsg$kcm(0xffffffffffffffff, &(0x7f000002c200)={&(0x7f000002bf80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f000002c180)=[{&(0x7f000002c000)=""/89, 0x59}, {&(0x7f000002c080)=""/128, 0x80}, {&(0x7f000002c100)}, {&(0x7f000002c140)=""/5, 0x5}], 0x4, &(0x7f000002c1c0)=""/37, 0x25}, 0x40000001) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:03 executing program 2: write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)={[{0x2d, 'cpu'}, {0x0, 'rdma'}, {0x2b, 'rdma'}, {0x2d, 'rdma'}, {0x2d, 'io'}, {0x2d, 'pids'}]}, 0x21) socketpair(0x0, 0x0, 0x0, &(0x7f0000005040)) perf_event_open(&(0x7f0000001180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 09:02:03 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:03 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x89, 0x4f, &(0x7f0000000000)="e6f07aa138b28a98491a0a94564bda76107f4cb0fa13108e537ed24502a28e00f175159284f1dc47d7d7399a33d9e44429ef659a7bc0f3a9da06b9238b7800f30234a1319e23c78039764a0620b15602ded87cc073ddbab16a031188a39ea3e1fe11c64e1f13558d532bb3701b9ffa0d25f85a068c0b4ba8cb66c4628881c97f2d032ef739c8590501", &(0x7f00000000c0)=""/79, 0xda, 0x0, 0x29, 0x3a, &(0x7f0000000140)="5617ffed31f95ce8033817cfa7a41db438da666b86f1200943fb52fe4e8a75436e98455ac89c537901", &(0x7f0000000180)="11e4b9783b43e04f1ef54fc26671108a513e9edbbe6aac19082fda39838246fc54b37d6f3d692199bfb3db2db91d620faa714c36c1ff4df6543e", 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:03 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000002100)={&(0x7f0000000000)="2aa093c47f3f595a8cb9a8ea1047f6fd4f3b62046ecdf582f6d8d7cc164eae29099c5d9c42a6944a047acd261cae1f69cbfe50b9d20fe0181b19b27933af08cb3fc3e89438be37561e31b5de8a5fdc340d5473f7be8e8783665e8d35f4c41b9efa", &(0x7f0000000080)=""/115, &(0x7f0000000100)="72a9d4940a643a011294de60ee76e493fd5cb1951b3528131f2b54ded8e29f940b3a81e56e8f487f27d7f7975019dcfbe39c32d0fc722b4a9fd7fb0d25f90dfad94df06923fcb1af1d87bfcbab7e996f20394e85c2b7a41f80d2c8e973b06e3ba18f5ced8b9d3d4ced63d34d788fe48a30d042751deb9e4264105412a33bb341c33a1060a55a4ed089d84419e386211cef961e0896f8f0d2ea10fa5e1cab76ae5c45cebd66363a27454bb10fb8cd58c4a0b69e5fa108e982fbaa1a26595a6b37d0f583503431e0a2b29b28869a961adef5ae0e592a01fe3e28c8a656131a4074d9b3cb87a0a3387a2530f5a40295688d2f05b99dfcd555be98cc8c20041ea365b5558cf302153b7d963f8f850a7b93c5f8424c04053f3055bf30a350d29bbacf6d4e50736c8fa0b6d701eac23ffd8740e56f122a18baf93b21467913dc01ba9058721fc1c57bd338a484495a07e4ea051ada858a4c850f2ac949946d27e7ea467bbc24f7a0e08bbd50fb64631b38934dddd792a252b51a81293fc608660cf566140c418cad67d5fdc7bc4bb55de8f917e057e9eb3f4e6e32b54a4eb21a0ed5ff3a4814e5fecdea613cfdef734741654ef8b5ea9f89d39fb78be01d62106a45b0017a3aacb3e52b4ac33572fe92e367f80a48a0f74336adb25b39a7e5205b2d75eb996c5fe0fc65da633f1d36d5e74f63193248e3cc604099a5c5c3ba2442efc21ae8aea3ad43cc530ed32e908ed114255c8d2d590950c46487339c2bc8b10fdeca730f7220b35e9921bd805d22e27bd3ea8700caa71b976bf69bea7ffafe34dd5f1724f1b578972e4875b970d16a883ef6b70055b6899672325dd0bd73b7ca5caeee6f8fee868621bea8a982e40c7be8a32d52402cc9f4abe9a4da3d45bacc9e875fbc00329b34425921d717224208d90346dd3dffd8b275d4c3c971ae6be3d365d1c00ce8f0fd8bba7415fa30b37df63888ced69da3ec6b3304e76323b57c07dd55a2763cc6208d1b5e2e96f1f4f5768044ef589751288f5a1747163946252a331ba946529207378a9f538b6b41781d0b09a20358d0ce4feb5d9e3ae24b96aba9e7efae19078886e456d57b887c078f79b84850ab97c5c7fd28fa88ebfa09e51ae0de618aeaf37700afb936c2e290048dd8cd39741ef18762c813947762565486b60fa06edf96bd9bec40ed14638b64e318b521c70a362ffbd596be8f75d03e9483aa026bf1072cb1c2e3db38077cc39efaf275ce1fdc465262f87c1d9fdbe936f4a0becfcc7fccadd366193acdfbb20e9a89d5bb2bd65688d234b318dcd3604c2308a3b8d21056f91d1ed1559870fdaeea5b0c91f81bc6d44ee23de21bfaf9b25d806fb729603c679868029bb7035adf6ff8f52c564849cde16795a3e75b0983c1d19cbf6d4ff04ba6cda5ff335e06811c07e994c0c4bc81d9516d9a4141b36620efa1d043310a4ddbd1e57b489a8f6094867982b9bf136702b9e5e6cd2c080ab364fb35d6e188fc70278c6c52f3142dbbd82298389c4eb0a895d992ef577b9efa38ad36daf955c780fee97cc6c66f86ce99dc01af793c835fa6642f0326a54d91bc6265935d45022965258fa39a2ccbc1dcb4532f568e5f4dedab8d47e54736ae6d13292db9fd04d3bf1b5e9972c67036be48da67387568975261186faa5ac9338c3e4d525a1fcb4242061ea11bc9184c78be2d4e4443b4cada91881ff51eec1e7a4a93181ad96f7ed1c64a5d039e26049dac38abd449e142d5aebc67568bb99b702a906198a16aa4f989d8abc05e4f60ffd07572e223b315177b10e206c3d74228efda924c7f3197d3822117377a3c34f68d44bdaf650f343ef59bf84f78e4030bc33fa246da719698aadadb43ad4dfa0bfb4d5e663ca0448660d3917c262fd7012bb4a06f26ee0334001b0b0d638540fe907d0429e4b365bae13512726f57767db3e389355e9259db2ee136939f5d95e267fa2b5a5b6dfdb2511f9989b50caa23679e46a7573e1984af8e1d4c731f03e8e2321bb51bc51868377eb4edf97d80d72d277124d461a98466c4a3d48e737e545349848155f46200d27beedfb04cc24fe3b0347bf50598a6139805e39419df9349696f5f6c3c68faef6626473a92c7c36c79b778811d475c107bb81a642643712b5667b721749f581166ab0c0c815704b8a285c8dc41d1e76c1481e0b5ad334ebae8f55920cd14d5b69d1b11ead7bca3aeb6a5fa16fe7736d9ac9e522ee8dcf8371988ec13bbd92b3b9135e4c66f1e97cb689c4eb1e26de986933197fe4336c096ec795df1004071ce425cbe748375e1ced4af0f77bf844b3629cfa2d304deef006ca29c9d604b3ec1fc0d3f9e53c291173edbb357cb948a1fa313aeb770e5ccbb9f3a9558ffd3f2179fe699ea6d57b11ebc2b707c9cc401e4fd442474c8165cd9dca0ada734080db46aeb4921202fe1b9e6a6c9847f5a879075161aab712976a21306c2db43f344335a7e4c194287f2bc76226c6340fc835988d8ecb771510f9ed3b22de0196fa974802612e397b282be7eb0878364b7a576b381742459fa153107e7c97da61c62708c09a0ccd3277de2d302cec89f9fdb1f14a0b937ee7469dc598befdb59d325f341032a0cca58068898b22957b8b56203e7529334276eee0c3d4ac002c7fae8fa699af46f406c269a2938f88f88d4c292e679d6fba97a02268c83151facfd7ae72f794786d60fa12fa2b37c0e33f8f6199d3fba8c985ebede76a418549b52f55db02039dd8e7210805c0f61845b33d40e23ad4a1e2b6be82e23e61024e256a536f770b47ceb45ca3f6212fe40000f37eeebfd8aa6b70296dbe54101368132aba62afecb2755959115e9ba5e01f4c8a2d251a7f16c1d2a6a25d72b3e327ba833010e76d26a37487e3710f8868e899ed66e1754b48562ec06cb42ff067be5648920649232c1e7a8ddc66582ddcf154d2ffb766f9dbaab6770e751326f0b31998e41455bdb4cffb2e1e294d20d0c23b5e4a1ab5b67504f3c845cf050d49ef610c6c8aef35e158c2b269192062701d3af67fd7b4950a2a38f260e8f8259c6a35d8a5faef763aeb74d28b9cc879a1397e2d7278582a73062cf46bbb78fc738e75f34884e820629aa3029267bc456fac284d9898e481e7c144e08fcf9b90062c4cd02166be121ce940d3abcde335ed0a92e8dce069944b85ada4636e2ffb05f8c3fd133fc2b9cdd69481ad5b79998cdcb0c514fbad8b63c0c2251314f7f125ed4e7df42b9ea925fc4ce49275048a8daf77d8d314632eb9b8093215bd7bda0ba97975240596076d5b543a6ec710c8485d66cf5ff367f3ea4eb5e4bf0cd285d21c259818a79c389e0419e24e709be96af07b4f2171a32134c9d0e51b594c1b2267ccd2a64c8be3eff02d1fa020d77d338559b87794a2318b70fa25d2e785c83ce1d361ff3061c1624ca2071fa115e4bf8657e7d9f00682f522320298245bb62f3e7bcd6182aaf8e72886957df6ee1e680ed4a621bdae2b62e98993c67713bc71ef5ab7f422483b75fe83be83234f2488936865fe89042dccb489734c740f3520acd2315bc474d201bc7fc0ae8ea5e0ee35883596f73b7b7343c27279079cfed3320c169026ff3b544ae1da3ad40b1036e91a9f502ef0309bdcaacfd6c0d616c8b319cb385a1faafd6e14ad3846dd6fea1cace863e3ee4072dd74b1f8b2e734206b782131ffe02a794397c7334ab2b2952e9642cd2316a2fa70bacc3fb1348f112583ab6008dec9c4a941b4561ae1b503cc4523b41b97c44a1ec099d3d0213f3b89ddebcec0c7ce5ff60ed68c2b0562b991b4d319663a3d6c18b3b07c32d80697c92f3c0c2fadbb42e050402bd5452c886a8cb5e82739200deaf0dc6472f427fdd90b412110e39f74359bf2acf6d983d9acd5ca8fa8b74255aee0f4a77b58eb8ece6c1e50ddff4f094187151004eda07e9eda54a9b3fef7d83ea0eb8c178b197f6428c0ba7f179e16264664ea355d0caafb8f94af74a8e70ca92b7199d664113c73b94bf60e411d19dcb0569dca06c3115b9be6bb91fe6b30ab02781b5841d368ae19b018369dac17076f121d624c6410e1209d1cdf7b43eb4b68aadc3b3bd89fe39c9a7e5bdc3c9f37654d31443bb22e88fe56cfd3378871ddeb6761d1f4ed6e7d4179395a23052f9e492f60e498699c92593ddf36b4a21d05dabdd35eb0e77edf39cd7ab59ed84185faf221181c3307031850adaf40e27513d57ba977f07794453d2302640b29202b0aa10d3be027bd579182d5d3427f107e5b6eda32bf1665ad1ed50ae16a199ef7b600a5bd600861d6a6460e6750e4713b442f496bbb1cdeea6c3bd754acd6206ec41ee26a35f318440a5a7e68aa8a879fca1cdbfdf1ceebf5b373b6e7b02ed59057be94e8fafca4a4e9b7c50a3c1dc1a34ffcca9cff376ff39ce7bb3073f017b07ba0f6c1492018e0d3a0a753a200ffe989e829aa512fa61cf7b0c41c1adf8edd15937ee74b72c1ba72fcc96e9c68194a074c1e075b0465385436a0ef8e34e6867b13be4f41df0a0b65a55d279aa5d2945031d24828c8c514c38b2dcf512df5a4dd1df896015606052206f081589958fc423ab365972d588abe88698c79158bc6d83b868b3cf443e978f14eaa385547e0c4de712e7b1bb19b435043ada192751f44d799ef9568b82a70383b452ed63242b832337dc3f7d18112b265bc1293d4d18b70048e9843776ba054531084bac1114b2891e69233cc23952b6b61f82eb013826713b581cb7bb1c0332c7e2a15ddc694ff39edd479bb10b34a85b459355f58b85ff1b84d7dc63a48369baa385c2eb8abf7c881dac88441a19e2fcef1b837464e641d86b70c2b35a197357cf31788ba5ebf69e2f887e68af6790b1a8ba644c9a0a50614ca6c50012f1fc8af4abedff90e967bf022aa7d13cb8ddbfad3b1bd41b66da42eac39b9e5a1d06aa9034c695e4fb949347e9139a2af9062ccbdf7d0be39737eff17c5b646e17e5b9114fae3773e4a1d7b789b718552b24b71af57e3810025c3199807be1ac92286f85fbea85fcd28265ad70437e1f7eaedca1d605c3d44d95a4fa0db0af9e1c061b69e97b7aa4d24f7f5062c88b49eb2b86e49a4d5cbc24864821e5f8b5db67b0eade1089d0b826ca9c2cbf7788a96db149687b90d93c73abc99f636406156b1a1e6a8ca70a377f1cbbcc51c5832662f9b488068caf2d78e620e74f30c8e9c2ff6ca497957f1631a620f459301deb9688ee5abd8b7d068f39854dfad2cc032bb8337285d4994b67b42054c3a5fece8da404c9f527f4baa0557c5103b8b50c472d18e0bc39b3739e018054e5246b1a665fc757882198ef1cea094a7305bbc9f690eff34d741e80a578ac9f38d0e0a8d926de9c60b816e9aec895f4a72a6d73abfd9e61781fc33c2e26debe25d1c7195e6e1e8264553756dc5be37a0ed1969f8e87c3663765c9e68083ef17d0965c9724b4ceacc2a5e8fe5c3b024e95a1601a5ed5cf0b38195aaaa3366dfadcfeacebdfa18a0405617e1e32c4c3f3b7421e8c2c210436cba0bb5d5faa88091d7c76313bc7dc48a7d9bfc137c8053f04c880886c9301ff3418a061b696504323126a1ba0791eee9099cda6876cfe3dac154c201d5d6b8fb799f4cdfa2d16cde8abdd00ac87fdc6c87a601f4b8238f7312649823848488a8ce1b1b337287328da48d3ceee431c3363319e99b4766cf016997f858dbd2ff9cf14c683e6ba1992c9dbb42259a738a957990e28d006c5526538e2d1a4631a898a5f48ff506dcbbf9c796625516aaada7d4d3a", &(0x7f0000001100)="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", 0x2, 0x1}, 0x38) 09:02:03 executing program 4: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 378.261395][ T3264] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.267905][ T3264] ieee802154 phy1 wpan1: encryption failed: -22 09:02:04 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0xfffffffffffffe4f) 09:02:04 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 09:02:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:04 executing program 4: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:04 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) 09:02:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 09:02:04 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)={0x0, 0x5, [@broadcast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}, @multicast, @remote, @local]}) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:04 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) r0 = socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) sendmsg(r1, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r2}) 09:02:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:04 executing program 4: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:04 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 09:02:05 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0xfffffffffffffe4f) 09:02:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:05 executing program 2: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)=""/16, 0x10}, {&(0x7f00000000c0)=""/240, 0xf0}, {&(0x7f00000001c0)=""/178, 0xb2}, {&(0x7f0000000280)=""/125, 0x7d}, {&(0x7f0000000300)=""/70, 0x46}], 0x5, &(0x7f0000000400)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf8}, 0x40010000) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:05 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000000)) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) 09:02:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 09:02:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x0, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) 09:02:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:05 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x55, 0x9, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa68ecaf732085b19, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) 09:02:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x0, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:06 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:06 executing program 2: recvmsg(0xffffffffffffffff, &(0x7f0000017c00)={&(0x7f0000017940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000017bc0)=[{&(0x7f00000179c0)=""/120, 0x78}, {&(0x7f0000017a40)=""/90, 0x5a}, {&(0x7f0000017ac0)=""/243, 0xf3}], 0x3}, 0x10101) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000017c40)={0x4, 0x3, 0x8000, 0x31f, 0x80, 0x1, 0x81, '\x00', r0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x40) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x81, 0xe8, 0x1, 0xff, 0x0, 0x400, 0x1012, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xd8c, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x40082, 0x7, 0xd411, 0x5, 0x80000000, 0x7ff, 0x1, 0x0, 0x4, 0x0, 0x7fffffff}, r1, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000180)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2}, [@null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @default]}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000200)="d77e29ecad875986df0fdd4bac9ce4be01d087df9d7d8e6eefb70ad1ac989a56bb317804d742b3f1c535111fa4ae28ace115ac768e259d3fa14be9e27d6f1f140be8a50a2a1c5e96e957d81044a488688fc903000000a87a60b90d70a5d7c97d99925a46677eb7da2ce70d7890f1e7f0602ec982b5da96e06c37c197af17285dda021042a5ba62275739b1a19b9c181bdb2df4aa6a63348c0d3c8525785ee7df7f7cba71e5b12c3661", 0xa9}, {&(0x7f00000002c0)="d07281e46a993ce380416867a9c82c44d569b4a48dee93e3a918e469e184df9da0ca60", 0x23}, {&(0x7f0000000300)="ee992acb660af8428f768f5e7ef19b57d6d62e57878ec225170eb006064975ca4a1a7692520b3c1e4c94f59d2330929cdfd5d7db00241e08c9293476a57e2664a4d8f34c259bcacfb6e4d2e6c5238f1d1d1561043f950c33eb8df2f16149bc71b1bafeb2cb82dd265d69ab0db08857b1e9bb4f13f58cc4b90d02865d09de618a60106ee9ee35d798f4eebd5232e6dd248a69b67b5fab14a91c480174b7235318e7cd7681d5422d97c683790c199ea56c2dca10d090699c185f8e80f7a987c85c861bab969b8422191739e87779801306d0d2", 0xd2}, {&(0x7f0000000400)="4b974a333bf544deaadab1b5be4afd96cf8bb7a1cdb777724fbf0a155389906eaaf83b704178856a201759ee9feebe2b7d5addb850aaf82339d55873ffe7e07185ab743209242aa5d52101ccf9d3e303ed313cf79d59a8759ec37df3bf4328cbb02d4978749893edbe32681bf3e1bcba717334627c811a6ecd1fad2f9692a50b04b848e748c5e62478f3e9e1876a9d9318807e1c8e834dd575deac714581983ee2f6310e8db9e12ed0e4f54661194720d9bf96f004a0c407e05d8b760e98c86fce45b5e4a18aa21134b6640427e645e94e631f7bc8e09bca7254cb1dbf1029729a783eb66a32a1b9fa", 0xe9}, {&(0x7f0000000500)="bbef870f31b485faddfea00bb4706d66b038092d84dbfa295bde71df094a6d39cbc504514904a4bad813bec2773d34f81c3c01d8c2b6982f32bf9e68d27e888ccb2e1f70dae2b9d31f58a0e345f3279b935a50e583b70b7f53ecc313fe66c902de621c6c7ec2319aab680c0a2451dc73b2ab001a65c1e55fc810da8ce03800617300ac9074795a8e4ede4c387bacc64bc40cc6259bf553d20347e280b79f0d465a62f8b0044648bf77a743d7bfd0c9bf10def12c563d978dcc958a964b3f28c6e7d7d4a37a0043c6032add11c16cc4ca1d3c196b3ee188bf247a45432e440163695bbd", 0xe3}], 0x5, &(0x7f0000000700)=[{0x38, 0x3a, 0x722, "daf6814eac6dba42e487e406851b71dcab4fc1d5a86278e32910ab9d0d33cee514d3ebc288"}], 0x38}, 0x4004041) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0x81, 0x7, 0x1, 0x4, 0x0, 0x2, 0x10000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0xffffffff}, 0x4000, 0x2, 0x4, 0x5, 0xb589, 0x20, 0x81, 0x0, 0x8, 0x0, 0x3}, r3, 0x9, 0xffffffffffffffff, 0x0) 09:02:06 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000), 0xc) 09:02:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x0, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:06 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:06 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000019c0)={0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2}, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:06 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x47) 09:02:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:07 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:07 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0xe, 0x6, 0x3, 0x0, 0x0, 0xfff, 0x402, 0x5, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x8, 0x10001}, 0x880, 0xd853, 0x1182, 0x9, 0x0, 0x9, 0x2, 0x0, 0xffff, 0x0, 0x7ff}, r1, 0xd, 0xffffffffffffffff, 0x9) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x8, 0x8, 0x5, 0x0, 0x3f, 0xc14, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x17fb, 0xd0}, 0x82, 0x80, 0x5, 0x1, 0x5, 0x2, 0x4, 0x0, 0x4a, 0x0, 0x40}, 0xffffffffffffffff, 0x4, r0, 0x8) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000080)={0x3, 0x0, [0x0, 0x0, 0x0]}) 09:02:07 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x17) 09:02:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:07 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000014c0)={&(0x7f00000012c0)="cef312e9f5c197e736ba9cdd361c97d9971b7d357b0a49704a9f7ddd784ec05ac3a97e13b5c5a9d68c56a09ec3541ccfd96ae03dd439369bf668b1e093ec6b551612", &(0x7f0000001340)=""/2, &(0x7f0000001380)="c5d08a88c35a7a612ee28b6d32d2fc169d8ddde9fff68922a6e31bd7e3fc4fdb35ee0d52789ee85bf1538e0397bb06dd62b1ee80ec9a16959a1a903191c3ae8d4275d6db14058b49c9", &(0x7f0000001400)="39e41db19c22abf7f271fc1064a1a2c8c813843c442d8d5533eebc764dd591a3b5d53742439462ca89b60af3382e5c90752b2bbd8cfd82588d39facc9328369827cf449e5e319d5b51e21cc92efaa023df97188d68b4a973cb515b230d488ca881b5d8620eabf859c972db6c81d9f6bf05d74a41ec6fce65deecae9443499de103006787aae3b00647abff5e65e9b56cb841fe4307bfb913a40968fd6eb7483c0d9b933c69cea6b330eca40f5683c3e7236bbd", 0x10001, 0x1, 0x4}, 0x38) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001240)={&(0x7f0000001200)='./file0\x00'}, 0x10) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001500)={&(0x7f0000000000)="4a2d5d0d639f2dac0fcbbff94d7c380c7c86c09bf6797a3b67cad5efa041501d2ecb53f76520e7aede629b8cef44a64c56e5790a59b507c2419f174b31e6038f6ce1f9a2f390e7ebcadcb057cf2ffbc66858b1622648eeea5bb3fbf4d2", &(0x7f0000000080)=""/251, &(0x7f0000000180)="07fa7ebeaaa792b033a7ba6ca21b277095be3adb61946eb868ff3d18c23e3167c5f00904078e9ae8ccd254d095828fdbc1d414e02444f8593c45512ddbb6b8f10d8ff56e9db44bdb297f64ae7eb960920af90ba0fd73b9cc3e93db4ce9736da270892aaf04b588bba46b3c96b88b26443646c2a37df1f5c4b87335545ab4e073f14fe6e48143deade2185a789682e8488121b079b3cdb3860e8c2da9b3a09ec0e2b22bf8a64fd214e1b362d9ac0023f9c69847872fe98692ac261434e4b16f3ff52a0f1aa951ab95665ac6bf90557a0c07a74296dee6a4ead7514265982e825d0701016ba32fd22e49cd9e8e7b387b4fb5076d2d50e53f3a659407a146768fd6331087baf0ec6161388b401f5b0f8c20c5c9f8d8964b037783cd8325533a976ad146c8aeb8ff67cd5cbea67208f198843c87533c4faba4f973e38b97bd0d7417cffb6e18aa88cab773d11a4f91f67841274d2161a6d516fd6510592d82059ded3d22886e3bf9b3be648adf711f9f37013a08dfef44b2ad5d905d5076b721493c44b2e0ab965cbd0cb71ee3db48a5c4454ced2a223e15a3295e5c0347906c6a17dc7d4c72083e34d9f71b2fb6d7e067c9fddf395f3725143f53b204ec33e034449ace2475a222df1aab6105680d9f44f3fd3da205565be83fca27c71b73f2e82904a2a571ea53e252c5f798fc2c34f3e6b94714ed919a2f858eae83fcd9a99688b25434193c1ca43987e2cd131dcc372bcdac8ac322bac150017adc5d4e27628385e6b1a7b6f9e79067c773cf7b39b4a2c4864e8bf05816b3fe43c135dfeaea3b77cd6e3f062b5cfcc8a2df51ff15bfd73d18ea58745d83bf8906cf166650bb7f3ca50bcb0839864aa41f7dfb48a97533ab77feea02aab21cbda2a2a1b05007fcf2440de77dde9a792fe42ee5f947fd0a11599305f08fb6f951094bbf910096d1d4425bc8d789f1cca9c20a8200f0fe7510e71e49e6c20b736dd36818294482d852278e3d15bfe0b8aa9048bc7859256a8a5d71a26697e6988ee1b5601cee133542e32124493508cb5824a05d9e5c3a694ab51c593f9edaf0def3a04b9ccaf5d598e440ba3c64af1139f18830fcfca35d20fadb6303c3ae515f9c16b1c58d0c2c55dcc73314ce5028aac73a6db3c8336a2ac77c8f8e5be3bee1a92d0cfefe96bca3c5f1f1bac38660809cd13d6e5a399f42e4fabe244665c191d04325c88fecf2e8c5d3da45d5bfbc4aca252b25f2708149347ea2160cb10a172745d036e01447797426b6e96a770fdb6415ab9249d4448345805c9222d80d5cbb7cecf36d5ecd067f723e8dba462acb6c58ddb50a42be1ff5a3029eee8656dc03f08c879ddd3c97995559439a8070fd4c4587b86046bce03217d3f0c21d7116fb06ffdec1966a1d6b0907ff24a49eb672bcfd05e03360226d06603aec5f66285c6c30c9097317e7962725987377d10c0ea9772c0493f2b4d14477e051a402c33ddebb1030403e2b45707d86e2de5ab26505245109810969f8e21d8efd0d1a5071e3ad609cf2380dd03967e370ada9b679a55941f1e45003b7b2838cea48150f0499aae704e3ecf377fd37dac97feda35ee461f2ffbab99f7288f5940725c037272773528875f667fadc359bfd9c18d18bf7c109eb82d8cdc800160e001d75529d9af4957d844b11f2848788ee1fa1b03c0d7b02b2459ce5f0d8e69b117ad0309a82be2e718a7e642ac1ac3b24382b765aff3936fdd189b395835803f6b63d129feef5d7bf5d3901ee1994b28a3c4d5645e0ff47dbcba8c3b170f997b51ef5a701314efe9cb207a37e35dee92bb9082932de6c21c87e84fe05e00de7a3e7e5a47427d2bcafdde61a430f5a37c00a4f930bfa5615369bcb9b9ce8d6156d7a6c3b68c52112653fc3ed8b1c2b5297c8663ff1cf81099b063ced29297905bd608c9c57c5422336c77c354472efe83bfb8207973496a78b6104e7cfdb00fa891adf8aba0fa9eefe2c109666a69dc3e530d0887194db3c86f39fbee38a6a907fbc7ec2fe97f6bf9fa7259ebfbabbd995609e1224db084ecf1cc72f0cb1a8ceedb0b071f362d60beea52d62b9ca1ebc5acec59a55c6a8b09ff2d3b3e2cdd7b9ec2e5053bb2a36194a454bfdda4c6dc27b0592a2274b813fac04e17e814aacb78a989909d231d46da6a8d12836effeb4dddfe961ffdfe758405ad2fd4680d3cc7082960b1abf660afe04151e545f24a76713e432e9fbdf33036cbe193116ff1d5531204a990bd817aca0b836a4a3e7fbb90b30dff765ca0246c56131f4eb5617b1fef0c2ab22988a7db2edd3144fc2ed7d8e6d9a45cff147b7297c4e79bc52408c3ebec0e55345c6e7ca8d49574c61e3d8e3cd448fde60b3700895087884359ad1ff81416b1ff4772ebe0070f74b6eda3e2873f76858d8e8a3f0abdd514346a522ab6fa3accfc30d32bc0f3e2d438c724ddb540e555454d6c6a844a0eaae5f25e11b05ecc2c91830259559ce8f1768d5560500db4b7c33219b231313fef15a6ddff1582f3c1be1fec4f716d40309d29ad72b48d5164e3386b2428ec1011d8b102ead1084e4bd0d58e2bfbefcbef3bcf8059cf9f00b53f563db88b8aba2ac621b5ea5268420dfd39f903c6dac32c6c88959a287652b995266b54e68e066d2d582d1ba2723a01843610902b0f2b3223665d46333e1c2178ba0249e44c05dd4f3134adbd1c9ba3c697b62b26629322e62ce5e451e350ab1f0c6f234f62124a3d7cc62373f7210ed298f7d6bac2a9a71502b3bcac4cabcaa7b0faf2025ef50402b82a0a5b207d842764e6f36a4de192e3e158c2c660e1eff435302d63fab4788724455b1a377819d069f23c5543d59f9a8e892d4c7ff73413cd3c9c1c1d2cdb9caf0ce7e037d0b456ab11a8b272285acd7c04b879c3b38ec59222be0a5478c1fd9e6def348654a8c6dac4ab672a0c996aca92655f0b41a416c40a9268692f70f6ede21f1474dcfa21e7fa472bbeef6de7e5321f2ab5a97ff06f85cb57d9b59a552187d0211b111f89ea5c1884baf613a9f460567c641e2062242651e200552d8ca9d79b8951ddda24a8f0ce2b775d75cf149456b266bd59354161c1be90bcd19291cd98f24169bd4b4378c5465ea0d7bbb89ca53f9eb94a978a7426b3ec0795c5ecebaa8650999aef233392c6e9faca281b7c15f65985b1d085e18fc80fb2b7b1216f95a71f5ec7fb2b35c98dfb7307d224344d6f30e977615345e24354c88c7d3e61005cc2f574c2adfc3749e1215145eed9b3d21af4dce539c6d2aca5566111e249c9f96f2908cc320cb708090f6ec44ba01e4e00a2f63bc9342a48501b8326c02ae27313b314e630863bc3a8484527d4ecf79218468b0a0e277ba46bef8c879557f6ac8c2a8cb86b93bea777eb8e4b681c68d86f56f1f5081647f840aa21d32a4e2fe57d194d86afdca1ec9c2b1b5f329429f3cb6fcb041dbcc798eea3ca0e64bebcdd151042747376b808590a908b742cb8cc1355d003b6a85f535ccbde2fe8c43f2779903d70a81a9f35ef2e3afc23231ee892721254f16d17deccc73a0b6cc93922920d4c5996b117e25b22a8d4a705c188f7ba7dd45a5e852b9045a074a857b834804fcc006939f0a4ecfbdd9f20fb1d5cf88dad35bda00e964ef534097ff924e45f9f1c41dc2d21209e483a427ab5102aeb4f1d4e0c5f70a1bc7186830996ca45c61a83502e05896e1defa611affd77626a47d6d212cc9258e083d4f424ccdd3f72ccad361bb6e9fdccc6acf89c5dc1ca600af02edb299e032039d91cb94750ef3d181dccb9b38d7204ea14fc759f9d3b271120118132450b1c1d22093141a8aed0b581b30e54e876884c9baf3083e972768510b1fa3ece91bdf36fc203445dc3dd32dfca5fcf2d1a496065d2803f3093459a0251a70a0c9f8b0caad4d3ceac70b67c96cb45bf889f3c32864e9fb37bafefeb328dbb586fa89f2cc54aa24ff812f2b505b14d1fa4d3dc67f169015d9746fddad746748fedecac72c1ba7adb716de6837cc0695066f881091d5f8585ff8e7a017fa2235be530e345f95bb2005c3f79a34a4883c5dd6c14c453aac74705fb3f3d7bd6a60048ee269a5ce482b04a3a67df0a74de5a16838a41c9c3cde89ee8244fb1d6fcfe538f442dd89f42565730e368d7222b8221a7028efe24ccc78551922343e700e3fbdd9d9810e5275802a0ee4c076097ccf5fd535134f6f628e3b0f55bcf9fea8a09445604d420f72720659d033d7c55b8e6367d3c4ec7de7c2ccd1acf37e7d0a7c77db47b439010b014adbc9320a23e48e6a8caa65bdd790dc277d08170b4781d586732f640fb0d4c8090c0225fa6046350b8b33fb839775b0c1b68c2b8cc699c62f1afaa97da2d408500e72b5b7f6113b5cd0ae77ee4ed99b413e008e86e2d812f33bfbb048a18cea8818bb65b06634b4e40538c2aa061739943f9f777949708f17da1c538fc027f8b964b0b4dd510a6a535e9f4298def900d42c80504c814dcf05578be5b39ccf2dcfe8740918df42e2ef1c78e6043446271328000a6e3719c33ee28890207bb971d5b6c158361ec9a5209bd33a9c0d29eca6cf8b52e1a3d3a25e671384569b3c358568d9291eb46c487c60b030d608ec8e180708d221895e3bc16705658f81f3f6b59d5389be1ab5e19cc67d977b92fbdeb4bcedcb4b1d48353f2b5ecaf8d2f11ac933d62348f196083e0b3cea5717ee6bf0715d0e459e4c3051ebc12f1cb8dc52ed95e488d189b86a6bc62158d28196dd3caaae98cf2796db330d9b5cc42b38a1a7a8086c43e2db6105b764609943d947e886cbe44066ec2e3ed7d18c6cce059868c08ffb8c4b44beccde5a33e4a4999b689611241c2650e8351a8bbbea469510df3d644d57e187bc5716e961de0cfbc7146fff6f2b4e9e95f0247c0ea125390a1fad5ca492aa95ef858a27c33c95ec1925c88e7fc2962358878a41a282c711cd9223c0329fc7443bda0284b0c034252bb8ca63f698ee9aa43cbf3e3924fb6d609d4f957af4daac79ace957e7b25cfa480fd8d191facd5a72ba75478be9f11326ed987c64d4c7eca80b743eae395b602d2a1eefcf21f1912a4e9f597ffaca89f4c5c0a535d3a12db09725afaead037aa8239a886306db052f46b37b5a59dd82e0b806dcb8bcb4b60067de7259335407601fafc013b4c4b862d5351b73106e0ce253ebacc644879cf8b971d25523e27ec74ff4eb1cc1251273d8c787d8d5b8ace9aada4cc91a2d61adb9e3927a09c4e1d74edfcbea302ff47af853c731026bf684dfd0d5b0d55f02839b28e72714b95ece49be25d6ee033aadcaa2deb684638ea57dd57d6cd0cc0176b627cdd9807cc7e5fa13740cb4ed964a9366e8384c9062f4132dd37bd5dbd089c1b5a6436d6b2380889d5903b20e9dea5b357a77636bcecfffd13007b0c3727b0e8eb0e39813ddb9f579ea5e07a7694b0f1ef8954a7690e69503480e848d390e8bfecf3087e759a2fccd92c7be32dcee189d8a3e2fa0fa2f457624477dbcbda2f6c44af6ed55bc369da6d127d605eaf52bc6a86b2b246fd093f6d209054accf76e111f728afed9fd54b0faf26491b8ede37ba1ee0d00346c5c337dbca57a907d3af91f59596b96e99458731bf1b00995ba543f56a542668980574b0ecd0c91fa325cb46074dcb2df0aabb51616c28e415a6cb553f51951c68ed9bab22132c1068b24d5c35b1dfff63c8efa999220b5369142e3b820168ca7225e60cbee3baaee617cc7c64448577664139cffc97471c0ad3e", &(0x7f0000001180)="a775422ee541ecae48fe237582f8b70c4f85f3978d50f29ed31bfa054f3132abaae070ddb5ac8a264be3444d94ceb9c96fa149b1f8f9e0fc1e3276cdca38f42bf447f6f1914887a16aab88d86f853d9a29e9090716081e14d72f78173d5033e8007baacf1a0ba6efc3", 0x369, r0, 0x4}, 0x38) 09:02:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:07 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x24, 0x0, 0x0, 0x0, 0x283}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x16}, 0x10) 09:02:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:07 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:07 executing program 2: ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000000)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:07 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) 09:02:07 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x4, &(0x7f0000000240)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:07 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6d4) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 09:02:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:07 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0x6}, @generic={0x1, 0x3, 0x0, 0xfe7f, 0xfffffffc}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8001}]}, &(0x7f0000000040)='syzkaller\x00', 0xdf, 0x9c, &(0x7f0000000080)=""/156, 0x41000, 0xc, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xa, 0x2, 0x81}, 0x10, 0x80}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000240)={r0}, 0xc) 09:02:07 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:07 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/108, 0x6c}}, 0x10) 09:02:07 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) recvmsg$kcm(r0, &(0x7f0000003f40)={&(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/233, 0xe9}, {&(0x7f0000000c80)=""/34, 0x22}, {&(0x7f0000000cc0)=""/110, 0x6e}, {&(0x7f0000000d40)=""/27, 0x1b}, {&(0x7f0000000d80)=""/90, 0x5a}, {&(0x7f0000000080)=""/190, 0xbe}, {&(0x7f0000000ec0)=""/4085, 0xff5}, {&(0x7f0000001ec0)=""/4096, 0x1000}], 0x8, &(0x7f0000002f40)=""/4096, 0x1000}, 0x12041) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x7, 0x3, 0x6, 0x1604, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2}, 0x40) 09:02:07 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, 0x0, 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:08 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, 0x0, 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:08 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:08 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={&(0x7f0000000000)="b41d197858e24203233d4512ced5c5b95d33070b3e047b967e9d5c53544ce844d33c41d3ae6e08fae9a45558b4c908ce05dd7d5183aac5d7ca8feae22171f7faa6444a0272989487028ac82bb0fcbc6433b3848c45641fcdfe79b7", &(0x7f0000000080)=""/199, &(0x7f0000000180)="42f16417ee8583db03172dcc7873140b6df8ebd44e7331ddf4464fe123d23a5402cd237bb197559537383d1bb961db1cfcab96aa24765f6172f0ba98d31fe47f45e32ce4ce7abe2e440b436b48cff6d6343e1c3a36032c2e69857ab748ccfa0d0af5bb08ac960746d325f792400e83e645406042324d1733ed6bf94fc72027d585e913ab5cc9e88f3f0e1d77a8e949478223597c061fb611e60f7333eb5b015a438e6fcfc765284eca0ec9cdf95f", &(0x7f0000000240)="dc25d589853de6b0afa699ee1f61c30e7ebacddc0122c015cae310334bd398", 0x101, r0}, 0x38) 09:02:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:08 executing program 2: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080), 0xc) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0), 0xc) 09:02:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, 0x0, 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:08 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) 09:02:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:08 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:08 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 09:02:08 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:08 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0xfffffd5c) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x5377, 0x18}, 0x2a) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r0, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140), 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) 09:02:09 executing program 0: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x63, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:09 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xe8, 0x0, 0x9, 0xfc, 0x0, 0x9, 0xac00, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xe5, 0x7fffffff}, 0x1001b, 0x9b4, 0x4ca7, 0x9, 0x7, 0x436b0147, 0x0, 0x0, 0x0, 0x0, 0x2d}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x2) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x5, 0x80, 0x2, 0xc8, 0x6, 0xd9, 0x0, 0x40, 0x200, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xa2d2, 0x4, @perf_config_ext={0x26, 0x7fff}, 0x802b2, 0x3, 0x4, 0x2, 0x10001, 0x7fff, 0x8, 0x0, 0x100, 0x0, 0xfffffffffffffe00}) 09:02:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:09 executing program 1: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x52, 0x0, 0x7, 0x0, 0x4, 0x90, 0xe, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xfffffff3, 0x1, @perf_config_ext={0x8000, 0x3}, 0x10000, 0x9, 0x4, 0x6, 0x20, 0x2800, 0x0, 0x0, 0x6, 0x0, 0x8000}, 0xffffffffffffffff, 0xe, r0, 0xa) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x234e35cddbd85a63) 09:02:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:09 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0xd) 09:02:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = getpid() ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000080)) sendmsg$unix(r1, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r2, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xff, 0xcd, 0x6, 0x7, 0x0, 0xff, 0x4900, 0xc, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x33aa, 0x0, @perf_config_ext={0x1000, 0x7f}, 0x22e, 0x1, 0x5, 0x2, 0x2872, 0x8, 0x5, 0x0, 0x3, 0x0, 0x4}, r2, 0x6, r0, 0x2) 09:02:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:09 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='net_prio.prioidx\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f00000000c0)={r0, r1}, 0xc) 09:02:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 2: perf_event_open(&(0x7f0000001180)={0x3, 0x80, 0x8, 0xf0, 0x1, 0xfd, 0x0, 0x6, 0x24002, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}, 0x1201, 0x7, 0x7fff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x40000000000}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) 09:02:09 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:09 executing program 1: ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000011c0)) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001140)=@bpf_ext={0x1c, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="6f88c0ff000000002dfaf0ffffffffff18260000", @ANYRES32, @ANYBLOB="0000000069040000851000080400b102"], &(0x7f0000000080)='GPL\x00', 0x7, 0x1000, &(0x7f00000000c0)=""/4096, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000010c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000001100)={0x3, 0x0, 0x7f, 0x4}, 0x10, 0x1aab6}, 0x78) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x4, r0}, 0x10) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0xfffffffffffffee2) 09:02:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:09 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:09 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:10 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r2, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r1}, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000740)={r3, r4}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={&(0x7f0000000000)="28d68a8b2a8963211530a180bafa6f244076da8107630adaa30f04b1de384d321f89c590819d5fca62a401444b38c9c7383df6ed60dfd311c9d5fd420f30839b6e1bcd63fb1e17b23f3bf9bc923d784dd8ccf6e672aa92937ed04714d609585190a197a419a9a9c195dd1e16e2bab27a04f5b3233c34e3c4c1867d8ec9413174bf57af9f2a6a80b0257666ce13193d55e985b0a3d4758ef35fc33ad70c2c46c63197c989b333031672f46e38f0f4f9aac08c1adc98ff1f9f832e164ff9d1772d156263d377ad255a5d4d961890f8b24442f702ae54e120422f3e3235fbf4a61f0cda65c7b0b7928d98e3dd8fff229719d437c73f07be368d8ee9d79b9a", &(0x7f0000000100)=""/240, &(0x7f0000000200)="82381b379ac26adc56d3cc7691db9a0b05f1df7f482ac425aa9d50cbbcc459584ef866c78c459a8f4bd6ad5fcbed930b3d14ccd1779a2746fc689f84021de2120196d919be9f748714b4092991132dae068c4fb69a5c1cd105112d00f1f9c1a8a6aa54c9136093e14d4dc14b763903f8c1b34e46a584be2ec2f8a0a43e6edecf88cb73a6036580ed41368926621b033382f89018fbfd1d9745643fd3a16fe6a83f5a43e8ad794208526c6a96d2bdea74743bbe7bd65c154a4237b9855972a318e4f54d3be44c53b7282ab2419350a420b128b0bf03c1de315155d1d0f02636e274", &(0x7f0000000300)="8f45fc4861090a8f40a6f7fed2f73037d8c0463ec7eb8a59da7bdc1b76147320e8a90cbbc5ab163e300540a0c66045c693187c1acfe3e835a8bc5fa37f68a0eba3f0be826cc6edb1830a51a8bfce7c061eb218fbb6b678cd75c209867ac6e834d4c56ee6c8c6d17afa8c39edbb8db1cf4f56a6edaa54760751689db9d990f070cbcafd9c8b0080514068d343af09b42f6c236545bf869bf46b00fe94795e1218a849850279fbc268dc7b64cb30689f8570d863c3fc71b925957de8672ea00f435837f6d92983dd8cab6e65cd1beaecd7677ec156df5cc4bb2774558e8e1ee57f10b37a2c2dfde933894f25c75519", 0x4, r2}, 0x38) 09:02:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:10 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0x6, 0xffffffffffffffff, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)={'a', ' *:* ', 'rw\x00'}, 0x9) 09:02:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x2000) 09:02:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:10 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f00000013c0)=@abs, 0x6e, &(0x7f0000001280)=[{&(0x7f0000000080)=""/30, 0x1e}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/244, 0xf4}, {&(0x7f00000011c0)=""/176, 0xb0}], 0x4, &(0x7f00000012c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}, 0x20002) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001380)=r0, 0x4) 09:02:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x2000) 09:02:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:10 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:10 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=0x1, 0x4) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x3, &(0x7f0000000040)=@raw=[@alu={0x7, 0x0, 0xc, 0x8, 0x9, 0xffffffffffffffe0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0x7f, &(0x7f00000000c0)=""/127, 0x40f00, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0x4, 0x8001, 0x3}, 0x10}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup=r0, r1, 0x32}, 0x10) 09:02:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 09:02:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x2000) 09:02:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 09:02:10 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="4f8f5d392fc71662817588595111cdf1c2ee6af56fad2eacc7df7c6e275c3746ee5c6f45bcd6a644d013aedc75e96d52c590d2585bb0a82efa2155d4d2597dc59cb85ef8f0f5f9c424eabb765062e09ba346f697f7063ea7452768b049f105b6576d2c8aed0db016d6c9584615bf1529b3b7233f1d575312dbd2cbe10234be01d86b06812c0f5cddbdadc96468d95878898e7c116dd2fa40655598a425391b57b020ee774dee2dfb2e79c8c507649a6bef9ae7e84297374228713cc9fb11aeec118da198a2ed584dacb8c27268f767264a23c77e33cbb11538cba22a"}, 0x20) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:10 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0xfffffffffffffeb2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={0x1, &(0x7f0000000000)="f08b5c5945c444bbd1765d6a5467e9872bf434e20fe6c1ddf58b7e0ec47fe6f0b2e93af27187e67f6e397f7cfa0d13f7d4f64ea6a3e224c60492d7e466b50e16076bd0f411e9013b82e2221e2f990e26548a20c0006ed9f61713d2d3666033ce5c61a8e55e23fd38d7bfed7c2cc474", &(0x7f0000000080)=""/250}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000001c0)=0x1, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={&(0x7f0000000200)="4610e58e1ea083e3e7d15b10d77e5891afd8e6b9b92491ff594ee5bdf6292914ac8d3f947d35eeaf50d349d66fa42e35c9cac124e0921232825ba1b34139576c12d87a31f175c57dd293ff0998c6cf47dd1ad573cfbce6381df88f9d28f310aed7d46698dc638278ada2ac23854ba6f3ec896c4da9a5ede8e3d94ed39dfbab68ae98cd13314edae4e75ed9a0bd5fb3a07e77da3f61ab19c60848906337266668c3cbb4ce4f801eac3d63ced21d123595c44759ed025a0e7ecc006458db71f9c1733551e69e1b554e69c1f22447fbf922", &(0x7f0000000300)=""/141, &(0x7f00000003c0)="eb67ee9381612fa1e02b8cc15194af217804e4acb57925070892", &(0x7f0000000400)="274e612d7aa6ab88517cdca2ecb3886a606e291d9693814e88bfbe71ab495f17414cfdb6af77f749c22386747486f1ca8686361a0acca81e82c89ef91218c4d354c6a4748bbdca3c031a048cd415dee4fb4997823969942399add69dd1dd3fea0d7dbe18fbe3e5daf45e8b866af0d566217280ee10f5c40fb28ed058e44563fea534ad16187604c87937da6153a4bd49c4daeeb92ee87444f5fab18ff83995c69b336eb2b07b3c33ba9bdfbb625f4e6717", 0x82b1daeb}, 0x38) 09:02:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:10 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}, {&(0x7f0000001300)=""/174, 0xae}], 0x6, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) recvmsg$kcm(r1, &(0x7f0000002ac0)={&(0x7f0000001680)=@rc={0x1f, @none}, 0x80, &(0x7f0000002980)=[{&(0x7f0000001700)=""/167, 0xa7}, {&(0x7f00000017c0)=""/125, 0x7d}, {&(0x7f0000001840)=""/240, 0xf0}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/17, 0x11}], 0x5, &(0x7f0000002a00)=""/158, 0x9e}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000013c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x1, 0x1}}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001400)="fdc048abfd47dd1649bce68b1f1e7733c120428a6822ec0cc473de0e4c3c4fad72adda4c5b67ef8491b9c7abb72de9c6976445f271c0b8701e73d9d4fb20a688932a0aa2076bbb450c33878556137d30dbcb6e7b2a3cb5160e94f7caf4c5b72d62f9db302cd5e4f0fa179e7e83fb52b9e6396c22a18032b1c4c124c1479090972e4e2d79769b6a81f1614123ed7f34fac218c763fe1f1e86a5df73834712fae76661f3adff04dd9768f910e768277720191a2933acd3d0f5b8d774fadc097464002bf3a1d176c1f8122af44372f51752f0c6a4a9795942d0e372bc21133efcbc4499b50ae59c5aba0f6acf4cafa2cfdb7df7226ed997", 0xf6}, {&(0x7f0000001500)="514b446ecfdca021d223d2d66a85ad154baf89fc132ef5522d9770e9a8db8481403abf5dafd1093aef2608d3", 0x2c}, {&(0x7f0000001540)="b93c1499823219f97df5d453c39044156fb713f30991a70ef327d14611969896d1afc647b6c3719ff1c2b82a23e66e89d0280cea26e38fce5eb7571b7ec9af63634a89d869f8096be6598070c733a1010048d6db7250ce92141d33dd7831030343a1254d61917c757b69a54e43b6f1469b4a2d66946c44289fe5fcef59ff04ffc74c931be4216317efcbacc65e32fe1dcae0fb", 0x93}], 0x3, 0x0, 0x0, 0x80}, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 09:02:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:10 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)={0xc, 0x8, 0x2, 0x10000, 0x100, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x4, 0x2}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001280)={&(0x7f0000000000)="ac0d45f498bb2eec8a124ee61380a1fe0231738e10824f449694b9f0ce67566b22f5821769db62b169a58ef12aee1f90b8a40e4916c52851ae2e2904cf6817ff1f2ca1237c85a2691e1142e1af2301dc95ccc3feaf7dc9b24bbe65633557cd893f5308766af0d995c49a66260899810120cde77d6fa5a4f122c2328dd5406cd7a999da44dfe079b5b158beef78eff81621a45eb6c471f5a6c00117f143f8051a0664af19f616011937e72ba4270e5e1556600d4df17d5d4aa5d4cafdca", &(0x7f00000000c0)=""/191, &(0x7f0000000180)="1a3128c2f63baa3a250a01622ac1d8268bcfad22d55dcd23fbe1bbc1447629f4cf6a1e6fa45807d5186ee35635b8c3851f1de69befffb77510841462d3d5d3f1f94615741f549a6c3107dc95dfac663b2d68ddb1289d190a877cd91bd56db4e1efca443dea2351f6193f367ee45c5dd3dcda6f46e2cdb2e7e4f77648759b4c4f5d0d0ab29bea0b388ebce36f385c30eb0e7ecb130950568cf46f7cd7576c3c7f6cad35b4aacbbd15f27b3ecea944", &(0x7f0000000240)="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", 0x101, r0}, 0x38) 09:02:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x0, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:10 executing program 1: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000000)) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 09:02:10 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x0, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:10 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0xffffffffffffffc7) 09:02:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:11 executing program 1: ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000240)=0x1) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={0xffffffffffffffff, 0x1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0x1, &(0x7f0000000040)="2ef9be79486b3c97c0c916f02399fbeb590dfa2c9da0f82cdf22676c80b7b2e794adcef2c3ebfe7efbb416cdd835302326aeb736da31e816c569ff31efe0469dc32450f86bdba65fa6223a829af2e876ea59a34ae6d08a4a0ed346a0759299f05f22987ac79eff266f730f2c6d4da52f876f42888ea7b27b590bdc69a57e39da0511181861685483118c17e0d86b74d22c6c5e7ad0dd835976cb4ebdaf8cdd9e2e217a46a95f06929485e17627ceb95874c1b4215e0b791f980b", &(0x7f0000000100)=""/202}, 0x20) 09:02:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x0, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:11 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x6, 0x0, 0x0, 0xaf8c, 0x4200, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x808, 0x80000000, 0x5ce7, 0x0, 0x4, 0x32, 0x20, 0x0, 0x7fff, 0x0, 0x2}, r2, 0x5, r0, 0xc) 09:02:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x3f00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:11 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x90d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='f2fs_sync_file_exit\x00'}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) 09:02:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:11 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) 09:02:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:11 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@cgroup=r0, 0xffffffffffffffff, 0x25}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="85100000040000008500000090ca8673e5782828a6000000"], &(0x7f0000000180)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x4, 0x0, 0x8, 0x101}, 0x10, 0xffffffffffffffff}, 0x78) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x4, 0x8}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r1, &(0x7f0000000040)="7f011e755044149846d1bf35dd5bbd2b9623dd744da5c286c669c4f6fc490c9309b586f0393e0748a289df769b19c1892bc0efd6c41f5fd72cc16c6733e7a987db9f76cc4d1d1b4664b3a391b02059552196ef09dd8d45b4c09ac08eea6f8b235d9e228975bd2fb9f419d453d41c52ab92194a904049178b57c3984230f766ac66746e8e97da20babeb48bbd39f349225d226df24e5d2184c276798639d5abed82873e7f6032"}, 0x20) 09:02:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:11 executing program 2: perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x54020}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x0, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:11 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)}], 0x5, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:11 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:11 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="0742d73dd7ffffffff07004a54ec77041ebf675500"]) 09:02:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:11 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:11 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:12 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') 09:02:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6300, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x9, 0x3, &(0x7f0000000240)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 09:02:12 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:12 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}, {&(0x7f00000002c0)=""/4096, 0x1000}], 0x4, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:12 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3800}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 09:02:12 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:12 executing program 2: r0 = gettid() perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x21}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:12 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:12 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x6, 0x0, 0x0, 0xaf8c, 0x4200, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x808, 0x80000000, 0x5ce7, 0x0, 0x4, 0x32, 0x20, 0x0, 0x7fff, 0x0, 0x2}, r2, 0x5, r0, 0xc) 09:02:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:13 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000200)=""/187, 0xbb}], 0x3, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:13 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:13 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x6, 0x0, 0x0, 0xaf8c, 0x4200, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x808, 0x80000000, 0x5ce7, 0x0, 0x4, 0x32, 0x20, 0x0, 0x7fff, 0x0, 0x2}, r2, 0x5, r0, 0xc) 09:02:13 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@ax25={{0x3, @null}, [@default, @rose, @netrom, @default, @remote, @bcast, @null, @default]}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/244, 0xf4}, {&(0x7f0000000700)=""/235, 0xeb}], 0x2, &(0x7f0000000840)=""/205, 0xcd}, 0x40012103) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000100)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x0}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000180)="079e614237ddd8a33d4060b8189a6c9c5472faa244bd0690cf4f43a2aa21fcb7bc45ed329ce47cba", 0x28}, {&(0x7f00000001c0)="24a21b2000c9933bc1c9ab186382bdd2cb2f8b4280f1bdbeee6de0cad125f6a97f61695babca2c181ce8815e4aacbe2bc6431cb3e0326a267612a542cd2227175c1c649eab7f0b69ea563c8f6ee874de6457be9a33af14583ce0508fd8151a70e8064f8f147e4d8d6087dea2c026518d2c87eba9072c2c824fcf61e7c10c072227666742cd1369ad16a7e2ef67990429f776016108e694622b676ecdc270dfa748395d9bd0d048b8930ef123a4fc96203a3dc4fa18", 0xb5}, {&(0x7f0000000280)="b64e29373260899e5c258bfc41168226d66515920b9927b000be1404c249e51fe56f24156b90befdacc1f5a98b321833d23922c85e5ced09bbd93a554d62b4c9260d1d921f44e7781bd89f2e8d4584797246e8705631a06be8f0b38c59e4623c5bc2c7d2e46c398901293d259e9204224fb458ef60fc67670574", 0x7a}, {&(0x7f0000000300)="11025812214f1769c7f6bdcd5ddf82cf8b48ffed3530f4b2b132f10e387a80669691e1ecf1d887f881f8857b8226c719c5ab02faff144c5c8d6958d4aef6f2f0bcb926ae3c19a45a3b16596c252d2345cd79e4630f6e5f452f858f3926bdfb9aeeb7", 0x62}, {&(0x7f0000000380)="60880c216f2b202940ef7b593fdb49feed3b765456e42bbf694919635493ff7733adc061ad72031c3fd48c1d77214e8d80f5ec5b1a85a8ab39b9a097c18d61ca3bf8e703bcd3279aece07bafeb6ae6c222672f35e72b7c2a4a0883216204ce0f2358dfd67806cd6f98f1f2c5d7a559216a8c1ef845d56b7e911bf0a01cff236a5bff92887075a6597f06a41b2ccc51c8472a16c56c42113dff652c3cf3475a2d8cfc2da15c1f7fa0e0aecbd50ca59cd028e0e7b80a9867ef59963e14787a9bd1b1ea4dc36757942a597b49f9d252aa980a3c0ab654c4b406c4a7b8d6839a6fdacae6725237e8ba3d09a1bd1dd4d60e2f9a64501967dd9c89d90e", 0xfa}], 0x5}, 0x4001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x3, 0x80, 0xe3, 0xaf, 0xfe, 0x0, 0x0, 0x0, 0x80010, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x800, 0x4, @perf_config_ext={0x9f6, 0x5}, 0x2, 0x100, 0x7f, 0x6, 0xfffffffffffffff9, 0x2, 0x1f, 0x0, 0x1000, 0x0, 0x8}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000980)=ANY=[@ANYBLOB="01000300ffffffffffff8fb17cbb9a8d0180c20000e5d8cbdaf513bf33c85475f7b2439269b004ed3f8df383589ceca897a1fbf77ad23272c6f26539fc6698ba387134bb5d414f893b113c76deb3bad4c3190407e78a984570c6817cf6ea581baa18f9baf52e117f9e32b2ba624724ce312671061de6dcc28eeac18342071bed2f504747b7b25fab352d15726aefa9433f55edf22c623abdf8d34ec8ca2ae3d9ba3c5dccb46cb3c075e6f75e47042b47d6353b7b0ba8999eaee02428fc04edb45e551a261d2aff0c86449329b3825069077b56a9a6dd384a92ac7cd0e6ea54bbe998ece16d3f3a818d9ff13382742ea90b88f5850533d1eb6b5cff26120a13799d02d65e0fba71"]) perf_event_open(&(0x7f0000001180)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x220c1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x1e}, 0x0, 0x0, 0x0, 0x0, 0x3fe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb100, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:13 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) perf_event_open$cgroup(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x6, 0x0, 0x0, 0xaf8c, 0x4200, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x808, 0x80000000, 0x5ce7, 0x0, 0x4, 0x32, 0x20, 0x0, 0x7fff, 0x0, 0x2}, r2, 0x5, r0, 0xc) 09:02:13 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) recvmsg$kcm(r1, &(0x7f0000002ac0)={&(0x7f0000001680)=@rc={0x1f, @none}, 0x80, &(0x7f0000002980)=[{&(0x7f0000001700)=""/167, 0xa7}, {&(0x7f00000017c0)=""/125, 0x7d}, {&(0x7f0000001840)=""/240, 0xf0}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/17, 0x11}], 0x5, &(0x7f0000002a00)=""/158, 0x9e}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000013c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x1, 0x1}}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001400)="fdc048abfd47dd1649bce68b1f1e7733c120428a6822ec0cc473de0e4c3c4fad72adda4c5b67ef8491b9c7abb72de9c6976445f271c0b8701e73d9d4fb20a688932a0aa2076bbb450c33878556137d30dbcb6e7b2a3cb5160e94f7caf4c5b72d62f9db302cd5e4f0fa179e7e83fb52b9e6396c22a18032b1c4c124c1479090972e4e2d79769b6a81f1614123ed7f34fac218c763fe1f1e86a5df73834712fae76661f3adff04dd9768f910e768277720191a2933acd3d0f5b8d774fadc097464002bf3a1d176c1f8122af44372f51752f0c6a4a9795942d0e372bc21133efcbc4499b50ae59c5aba0f6acf4cafa2cfdb7df7226ed997", 0xf6}, {&(0x7f0000001500)="514b446ecfdca021d223d2d66a85ad154baf89fc132ef5522d9770e9a8db8481403abf5dafd1093aef2608d3", 0x2c}, {&(0x7f0000001540)="b93c1499823219f97df5d453c39044156fb713f30991a70ef327d14611969896d1afc647b6c3719ff1c2b82a23e66e89d0280cea26e38fce5eb7571b7ec9af63634a89d869f8096be6598070c733a1010048d6db7250ce92141d33dd7831030343a1254d61917c757b69a54e43b6f1469b4a2d66946c44289fe5fcef59ff04ffc74c931be4216317efcbacc65e32fe1dcae0fb", 0x93}], 0x3, 0x0, 0x0, 0x80}, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:13 executing program 2: perf_event_open(&(0x7f0000001180)={0x5, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8800, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b51d861}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:14 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}, {&(0x7f00000001c0)=""/32, 0x20}], 0x2, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:14 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:14 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f00000001c0), 0x44, &(0x7f0000000200)=""/28, 0x1c}, 0x142) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:14 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:14 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x800}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7c39) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f00000000c0)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0xffffffff}, @generic={0xfd, 0x2, 0x0, 0x5, 0x80000001}], &(0x7f0000000100)='syzkaller\x00', 0x80, 0x7d, &(0x7f0000000140)=""/125, 0x41100, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x2, 0x9, 0x2}, 0x10}, 0x78) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000340)={r0, r1, 0x4, r2}, 0x10) 09:02:14 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:14 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) recvmsg$kcm(r1, &(0x7f0000002ac0)={&(0x7f0000001680)=@rc={0x1f, @none}, 0x80, &(0x7f0000002980)=[{&(0x7f0000001700)=""/167, 0xa7}, {&(0x7f00000017c0)=""/125, 0x7d}, {&(0x7f0000001840)=""/240, 0xf0}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/17, 0x11}], 0x5, &(0x7f0000002a00)=""/158, 0x9e}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000013c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x1, 0x1}}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001400)="fdc048abfd47dd1649bce68b1f1e7733c120428a6822ec0cc473de0e4c3c4fad72adda4c5b67ef8491b9c7abb72de9c6976445f271c0b8701e73d9d4fb20a688932a0aa2076bbb450c33878556137d30dbcb6e7b2a3cb5160e94f7caf4c5b72d62f9db302cd5e4f0fa179e7e83fb52b9e6396c22a18032b1c4c124c1479090972e4e2d79769b6a81f1614123ed7f34fac218c763fe1f1e86a5df73834712fae76661f3adff04dd9768f910e768277720191a2933acd3d0f5b8d774fadc097464002bf3a1d176c1f8122af44372f51752f0c6a4a9795942d0e372bc21133efcbc4499b50ae59c5aba0f6acf4cafa2cfdb7df7226ed997", 0xf6}, {&(0x7f0000001500)="514b446ecfdca021d223d2d66a85ad154baf89fc132ef5522d9770e9a8db8481403abf5dafd1093aef2608d3", 0x2c}, {&(0x7f0000001540)="b93c1499823219f97df5d453c39044156fb713f30991a70ef327d14611969896d1afc647b6c3719ff1c2b82a23e66e89d0280cea26e38fce5eb7571b7ec9af63634a89d869f8096be6598070c733a1010048d6db7250ce92141d33dd7831030343a1254d61917c757b69a54e43b6f1469b4a2d66946c44289fe5fcef59ff04ffc74c931be4216317efcbacc65e32fe1dcae0fb", 0x93}], 0x3, 0x0, 0x0, 0x80}, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x80ffff, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:14 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:14 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:15 executing program 2: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)="bcd14fd2f7e8a37a6b5836b9335e55222678fc2b41dfc9e3971eba5511220980f7a72bada7ce88d2ac"}, 0x20) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcb, 0xcb, 0x8, [@datasec={0xe, 0x7, 0x0, 0xf, 0x3, [{0x3, 0x800, 0xfffffff8}, {0x5, 0x6, 0x57}, {0x1, 0x8, 0x10001}, {0x3, 0x9, 0x1}, {0x4, 0x7, 0xc}, {0x2, 0x2, 0x5}, {0x4, 0x9fcf, 0x6}], "de44da"}, @const={0xb, 0x0, 0x0, 0xa, 0x4}, @datasec={0xb, 0x1, 0x0, 0xf, 0x2, [{0x1, 0x2, 0x80}], "d576"}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x2b, 0x0, 0x65}, @datasec={0x7, 0x3, 0x0, 0xf, 0x2, [{0x1, 0xdc, 0x1200000}, {0x3, 0x0, 0x8000}, {0x2, 0x1, 0x1}], "2d9d"}]}, {0x0, [0x2e, 0x61, 0x2e, 0x5f, 0x61, 0x0]}}, &(0x7f0000000180)=""/136, 0xec, 0x88}, 0x20) 09:02:15 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}], 0x1, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:15 executing program 1: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:15 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) recvmsg$kcm(r1, &(0x7f0000002ac0)={&(0x7f0000001680)=@rc={0x1f, @none}, 0x80, &(0x7f0000002980)=[{&(0x7f0000001700)=""/167, 0xa7}, {&(0x7f00000017c0)=""/125, 0x7d}, {&(0x7f0000001840)=""/240, 0xf0}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/17, 0x11}], 0x5, &(0x7f0000002a00)=""/158, 0x9e}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000013c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x1, 0x1}}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001400)="fdc048abfd47dd1649bce68b1f1e7733c120428a6822ec0cc473de0e4c3c4fad72adda4c5b67ef8491b9c7abb72de9c6976445f271c0b8701e73d9d4fb20a688932a0aa2076bbb450c33878556137d30dbcb6e7b2a3cb5160e94f7caf4c5b72d62f9db302cd5e4f0fa179e7e83fb52b9e6396c22a18032b1c4c124c1479090972e4e2d79769b6a81f1614123ed7f34fac218c763fe1f1e86a5df73834712fae76661f3adff04dd9768f910e768277720191a2933acd3d0f5b8d774fadc097464002bf3a1d176c1f8122af44372f51752f0c6a4a9795942d0e372bc21133efcbc4499b50ae59c5aba0f6acf4cafa2cfdb7df7226ed997", 0xf6}, {&(0x7f0000001500)="514b446ecfdca021d223d2d66a85ad154baf89fc132ef5522d9770e9a8db8481403abf5dafd1093aef2608d3", 0x2c}, {&(0x7f0000001540)="b93c1499823219f97df5d453c39044156fb713f30991a70ef327d14611969896d1afc647b6c3719ff1c2b82a23e66e89d0280cea26e38fce5eb7571b7ec9af63634a89d869f8096be6598070c733a1010048d6db7250ce92141d33dd7831030343a1254d61917c757b69a54e43b6f1469b4a2d66946c44289fe5fcef59ff04ffc74c931be4216317efcbacc65e32fe1dcae0fb", 0x93}], 0x3, 0x0, 0x0, 0x80}, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:15 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) r1 = gettid() recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280), 0x6e, &(0x7f0000000380)=[{&(0x7f0000000300)=""/67, 0x43}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}, 0x40000000) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="c8698c8240e624ec3ff1e3d40a5a143b8647b9482e20635f4dc5a57efbee5d549b5b70482e015c6841d0ee84985afee275fcc169c73927de47dcd5d91808a24bc0f10a12abb28ee7e53a6c76e4b6b3169bdf17ac9837913f51c7fbdc8b6b3892885dc11f1bc567d4e1005e93b0333d4c54ea56519d0ab60dc80a8effcb2625bc561909a699cde3ddeb526a12d5ba19fd1527f5ca72ae4ca99a5d2c44442fda0c4ebdd6c74c6b3f6b9b0f2798e56a17be9fd867b01f", 0xb5}, {&(0x7f0000000180)="014527e37dc90b53653f0f70d26c3bb1e372591724e261d10db3bb98a01e609ee5706a7aed79b824", 0x28}, {&(0x7f00000001c0)="b09afb9f29a6d6b116462cf809d952bf3dff5d407e7a5c", 0x17}, {&(0x7f0000000200)}], 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=0xee01, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000001000000d044d9bd0dc5db130aace7e3a2571dfbdf5a329adf79798a51ba54dc24604b3c97c27b", @ANYRES32, @ANYRES32, @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0x80}, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000480)={&(0x7f0000000200)='./file0\x00', r3}, 0x10) 09:02:15 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:15 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:15 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:15 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4048, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xb, 0xffffffffffffffff, 0x0) 09:02:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:16 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:16 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:16 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x8, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x9}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6d}]}, &(0x7f00000001c0)='GPL\x00', 0x6, 0x66, &(0x7f0000000200)=""/102, 0x41100, 0x8, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x4, 0x8c25, 0x5}, 0x10}, 0x78) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000380)={r0}, 0xc) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x1, 0x4, 0x1, 0x5, 0x0, 0x7, 0x2010, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x54f, 0x4, @perf_config_ext={0x6, 0x5}, 0x8004, 0x1, 0x4, 0x9, 0x38, 0x6, 0x4, 0x0, 0x200, 0x0, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x2) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r1}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) 09:02:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) recvmsg$kcm(r1, &(0x7f0000002ac0)={&(0x7f0000001680)=@rc={0x1f, @none}, 0x80, &(0x7f0000002980)=[{&(0x7f0000001700)=""/167, 0xa7}, {&(0x7f00000017c0)=""/125, 0x7d}, {&(0x7f0000001840)=""/240, 0xf0}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/17, 0x11}], 0x5, &(0x7f0000002a00)=""/158, 0x9e}, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000013c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x1, 0x1}}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001400)="fdc048abfd47dd1649bce68b1f1e7733c120428a6822ec0cc473de0e4c3c4fad72adda4c5b67ef8491b9c7abb72de9c6976445f271c0b8701e73d9d4fb20a688932a0aa2076bbb450c33878556137d30dbcb6e7b2a3cb5160e94f7caf4c5b72d62f9db302cd5e4f0fa179e7e83fb52b9e6396c22a18032b1c4c124c1479090972e4e2d79769b6a81f1614123ed7f34fac218c763fe1f1e86a5df73834712fae76661f3adff04dd9768f910e768277720191a2933acd3d0f5b8d774fadc097464002bf3a1d176c1f8122af44372f51752f0c6a4a9795942d0e372bc21133efcbc4499b50ae59c5aba0f6acf4cafa2cfdb7df7226ed997", 0xf6}, {&(0x7f0000001500)="514b446ecfdca021d223d2d66a85ad154baf89fc132ef5522d9770e9a8db8481403abf5dafd1093aef2608d3", 0x2c}, {&(0x7f0000001540)="b93c1499823219f97df5d453c39044156fb713f30991a70ef327d14611969896d1afc647b6c3719ff1c2b82a23e66e89d0280cea26e38fce5eb7571b7ec9af63634a89d869f8096be6598070c733a1010048d6db7250ce92141d33dd7831030343a1254d61917c757b69a54e43b6f1469b4a2d66946c44289fe5fcef59ff04ffc74c931be4216317efcbacc65e32fe1dcae0fb", 0x93}], 0x3, 0x0, 0x0, 0x80}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:16 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) sendmsg$sock(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@nfc_llcp={0x27, 0x0, 0x1, 0x5, 0x10, 0x40, "dda23b14ccbc6af1d9e097f0360175ba3f46afdb006a339e7b6dbd8eea3843cb10bd7c418575ed3ff939b16a36e55432abda186d17419fc558785f47d8446f", 0x23}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)="28fb25a6ef827c8de9eb6e55e8572587a5916cd7ce4ef5cdf41294dfac87d1fb90016b2d9aa98108ddede3e78c955b2c0b580a58ede9ec14b0a1339ae1909dcbf75ac7a6c55bc64fe820f71a6ab2676c76e7b980d10fb5a5e2b2e22c22cb13d0f991ff4884bc796657a2451f5f89185a6fc02cf471d8cbd59b6ed143398bd59df0e7570d5e2567e8f7479575d597bc3a17485eabb1b0f4cb370ccc", 0x9b}, {&(0x7f0000000080)="fea8a6e431e4f5ec76c036ded3bf41", 0xf}, {&(0x7f0000000200)="1a8c4f054fc424cbbebb50", 0xb}, {&(0x7f0000000240)="84dbace3ef3068b2e439895a99c22d6e193033d339a0552a11055ea814e021d8c4a6df507de01a2a8ab659916e67b3d65ed5879676c0e28c46cfd2fee20a8a84150463b7384fcf18aca5224ff410d71b1f8d428dd21233f66e5993b861dc81e052b1271b778dab4c9d809a6e770b5a217b8836ddd4f49176863d69b32e648fb95136beddd1f7470ad99a504f5a86cb561ec530ebbf180d631a3e875843f28e090129e76628a8b1a767c07b0468ce", 0xae}], 0x5}, 0xc0010) 09:02:16 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:16 executing program 5: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:02:16 executing program 2: openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.sched_load_balance\x00', 0x2, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000000)=0x9) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'vlan0\x00'}) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x20, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x15, 0x8, 0x8, 0x50, 0x1013, 0xffffffffffffffff, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3, 0x1}, 0x40) recvmsg(0xffffffffffffffff, &(0x7f0000004340)={&(0x7f0000000f40)=@can={0x1d, 0x0}, 0x80, &(0x7f00000042c0)=[{&(0x7f0000000fc0)=""/230, 0xe6}, {&(0x7f00000010c0)=""/180, 0xb4}, {&(0x7f0000004200)=""/179, 0xb3}], 0x3, &(0x7f0000004300)=""/43, 0x2b}, 0x3) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x0, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@map=r0, 0xffffffffffffffff, 0x15}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000140)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r0}, @map_val={0x18, 0x5, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x9}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}, @func, @btf_id={0x18, 0x7, 0x3, 0x0, 0x1}, @ldst={0x3, 0x0, 0x1, 0x7, 0x9, 0xffffffffffffffc0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x2, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x1, 0x5, 0x101, 0x9}, 0x10, r2}, 0x78) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000004380), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000043c0)={0xb, 0x101, 0x800, 0x300, 0x22c, r0, 0x1ff, '\x00', r1, r3, 0x4, 0x2, 0x5}, 0x40) 09:02:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:16 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0), 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:16 executing program 5: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:02:16 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x744, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) recvmsg$kcm(r1, &(0x7f0000002ac0)={&(0x7f0000001680)=@rc={0x1f, @none}, 0x80, &(0x7f0000002980)=[{&(0x7f0000001700)=""/167, 0xa7}, {&(0x7f00000017c0)=""/125, 0x7d}, {&(0x7f0000001840)=""/240, 0xf0}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000002940)=""/17, 0x11}], 0x5, &(0x7f0000002a00)=""/158, 0x9e}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:17 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{0x0}], 0x1, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:17 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x200, 0x0, 0x0, 0x4, 0x10000000000003, 0x0, 0x0, 0x0, 0xfffff001, 0x0, 0x1}, 0x0, 0xd, 0xffffffffffffffff, 0x0) 09:02:17 executing program 5: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:02:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:17 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:17 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) 09:02:17 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{0x0}], 0x1, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:18 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x2000) 09:02:18 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{0x0}], 0x1, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:18 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'wg1\x00'}) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:18 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}], 0x1}, 0x2000) 09:02:18 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc, 0x0, 0xa}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) 09:02:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:18 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x2000) 09:02:18 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:19 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0xfffffffffffffffb) 09:02:19 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x2000) 09:02:19 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x10, 0x0, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:19 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8318, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x1ff, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:19 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000000100)=""/132, 0x84}], 0x1}, 0x0) 09:02:19 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:19 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x2000) 09:02:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x3f000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:19 executing program 2: ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x5) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'wlan1\x00', @link_local}) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x3, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 09:02:19 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) 09:02:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:20 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x1, &(0x7f0000000040)=@raw=[@jmp], &(0x7f0000000080)='GPL\x00', 0xffffff95, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@cgroup, r1, 0x1}, 0x10) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x12}, @alu={0x7, 0x0, 0x4, 0x6, 0x9, 0xffffffffffffffff, 0x1}, @jmp={0x5, 0x1, 0xd, 0x1, 0xa, 0xffffffffffffffc0, 0x1}, @btf_id={0x18, 0x9, 0x3, 0x0, 0x4}], &(0x7f00000000c0)='GPL\x00', 0x10001, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x4, 0x0, 0x0, 0x8}, 0x10, 0x329d, r0}, 0x78) 09:02:20 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x10, 0x0, 0x0, 0x0}, 0x20) 09:02:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x63000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:20 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28}, 0x10) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 09:02:20 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x2000) 09:02:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:20 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:21 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=""/70, 0x46}, 0x2000) 09:02:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:21 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x81, 0xff, 0x9, 0x5, 0x0, 0x5, 0x4088, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x16752fbf, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x8, 0x8, 0x4, 0x8, 0xae28, 0x5b6, 0xff, 0x0, 0x84, 0x0, 0x1}, 0xffffffffffffffff, 0x1, r0, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:21 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:21 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:21 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x81, 0x1, 0xfb, 0x1, 0x0, 0x1, 0x18000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x2, 0x200}, 0x284, 0x7, 0x6, 0x1, 0x8, 0xffff, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xf, r0, 0x2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0x10, 0x1, 0x617, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) 09:02:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:21 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:21 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x81, 0xff, 0x9, 0x5, 0x0, 0x5, 0x4088, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x16752fbf, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x8, 0x8, 0x4, 0x8, 0xae28, 0x5b6, 0xff, 0x0, 0x84, 0x0, 0x1}, 0xffffffffffffffff, 0x1, r0, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:21 executing program 4: openat$ppp(0xffffffffffffff9c, 0x0, 0xc0081, 0x0) 09:02:21 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0xc0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x6, 0x1000002}, 0x0, 0x0, &(0x7f0000000080)={0x4, 0x2, 0x2ca6, 0x6}, &(0x7f00000000c0)=0x7ff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x7}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r0, 0x4) 09:02:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:21 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x81, 0xff, 0x9, 0x5, 0x0, 0x5, 0x4088, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x16752fbf, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x8, 0x8, 0x4, 0x8, 0xae28, 0x5b6, 0xff, 0x0, 0x84, 0x0, 0x1}, 0xffffffffffffffff, 0x1, r0, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:21 executing program 4: openat$ppp(0xffffffffffffff9c, 0x0, 0xc0081, 0x0) 09:02:22 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x81, 0xff, 0x9, 0x5, 0x0, 0x5, 0x4088, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x16752fbf, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x8, 0x8, 0x4, 0x8, 0xae28, 0x5b6, 0xff, 0x0, 0x84, 0x0, 0x1}, 0xffffffffffffffff, 0x1, r0, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) sendmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000280)=[{&(0x7f0000000100)="4963d89c5d345bb45cb3980aadf6c438bca11ddac887d8c75b2b73a046f8a2e3318b70cf2517f2e85d46245384fd24e5cb0ab208f9c74429dfb5d75fdb37808e9c9de36159e4d2de3fe81cfe8f0602a478d0fb4c44a73cac587091dfbd5c10ee914a38814d94af0368ba9f2cc5aeb5a088ef0288c0a26689e9b9cea4a70fb3a1479b15906d5c0cc5269e80ae160568bf7800d6eb0482f545128fc5637e889d7998bb2ab482467c80af7292f6096368595d6cd2", 0xb3}, {&(0x7f00000001c0)="32484eeb932c21ae9bfbeabf23d2cdb7c3c2b11d7bbb29710f6be4da3ddf939535a00775ece9644cdf3fe07291fdbb846f756f3b90d39a7a347ab98f66e685bda74276f8791070a861c6bfa9bd5269d038e406155850c9ed2437375637b95999efb6d98a0ca932194e6e41d76384f772574685d2050fadde684f3f31d8ff068fac44923af4fce556694ee5837e29f1748e7304a30854b26a", 0x98}], 0x2}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1e42, 0x0, @perf_config_ext={0x4}, 0x49c04, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = getpid() sendmsg$unix(r2, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r3, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x0, 0xfc, 0x81, 0x9, 0x0, 0xc000000000, 0x20000, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x8000, 0x1}, 0x810, 0x9, 0x100, 0x8, 0xa07f, 0x80, 0x7f, 0x0, 0x200}, r3, 0xe, 0xffffffffffffffff, 0x8) 09:02:22 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@l2={0x1f, 0x0, @none}, 0x80, &(0x7f00000001c0), 0x44, &(0x7f0000000200)=""/28, 0x1c}, 0x142) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:22 executing program 4: openat$ppp(0xffffffffffffff9c, 0x0, 0xc0081, 0x0) 09:02:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, 0x0, 0x2000) 09:02:22 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa6, 0x8}, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf6a9) 09:02:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xe4ffffff, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:22 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) 09:02:22 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x81, 0xff, 0x9, 0x5, 0x0, 0x5, 0x4088, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x16752fbf, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x8, 0x8, 0x4, 0x8, 0xae28, 0x5b6, 0xff, 0x0, 0x84, 0x0, 0x1}, 0xffffffffffffffff, 0x1, r0, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000140)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:22 executing program 2: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:23 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x81, 0xff, 0x9, 0x5, 0x0, 0x5, 0x4088, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x16752fbf, 0x0, @perf_bp={&(0x7f0000000040), 0x9}, 0x8, 0x8, 0x4, 0x8, 0xae28, 0x5b6, 0xff, 0x0, 0x84, 0x0, 0x1}, 0xffffffffffffffff, 0x1, r0, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) socket$kcm(0x29, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:23 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) 09:02:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff8000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:23 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x40061, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:23 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r1, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:23 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) 09:02:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="b7a9bb1c0e647fe097fd1cc6e708c4fd76fe1c90688335db2f372e076c039100bcaa07c13ed1f4b5d039bbc29f81d51fa509c0e26b48d79a81319cc7160ffda35eea5eb1d921a8ebec7d059fcc9a6b6b00be799b59cc36211934a8c4b3a848a5de832f41073a1a42347da33d54ae55cc812fff693cd6af1eb3b84e371af2a4fb3aa3b36c59c67730a503f9a9de13732f82b6ac666db084f2ab97e0dc222432ccf604c043369bd1e0e2e79ec666a8efe9f6a36ab4847fe90852b958e1b6f20e03d17bb7a9abe14f5b3a8cd711976b0671e5602a57c5adcb34db764e8fe9fcf414e057b4636b", 0xe5}], 0x1, 0x0, 0x0, 0x4}, 0x11) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:23 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:23 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000080)=""/189, 0xbd}, {&(0x7f0000000140)=""/165, 0xa5}, {&(0x7f0000000200)=""/39, 0x27}], 0x3, &(0x7f0000000280)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x40000020) sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000003c0)="33709e27bba32bee155aaac81e7da8a0969090781f580d70fe2c308dbf0516e670c03506ae1c74e0f37672b17a182d1d65e7d3a0589a37f444e9401dd1407a31b8eb7b582391c9fa38a7d26b0a84fca7a4aa76ee86b3652d871227ef01213066c4ff43f2de7979", 0x67}], 0x1, 0x0, 0x0, 0x24040885}, 0x80) 09:02:23 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r2, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r1}, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000740)={r3, r4}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={&(0x7f0000000000)="28d68a8b2a8963211530a180bafa6f244076da8107630adaa30f04b1de384d321f89c590819d5fca62a401444b38c9c7383df6ed60dfd311c9d5fd420f30839b6e1bcd63fb1e17b23f3bf9bc923d784dd8ccf6e672aa92937ed04714d609585190a197a419a9a9c195dd1e16e2bab27a04f5b3233c34e3c4c1867d8ec9413174bf57af9f2a6a80b0257666ce13193d55e985b0a3d4758ef35fc33ad70c2c46c63197c989b333031672f46e38f0f4f9aac08c1adc98ff1f9f832e164ff9d1772d156263d377ad255a5d4d961890f8b24442f702ae54e120422f3e3235fbf4a61f0cda65c7b0b7928d98e3dd8fff229719d437c73f07be368d8ee9d79b9a", &(0x7f0000000100)=""/240, &(0x7f0000000200)="82381b379ac26adc56d3cc7691db9a0b05f1df7f482ac425aa9d50cbbcc459584ef866c78c459a8f4bd6ad5fcbed930b3d14ccd1779a2746fc689f84021de2120196d919be9f748714b4092991132dae068c4fb69a5c1cd105112d00f1f9c1a8a6aa54c9136093e14d4dc14b763903f8c1b34e46a584be2ec2f8a0a43e6edecf88cb73a6036580ed41368926621b033382f89018fbfd1d9745643fd3a16fe6a83f5a43e8ad794208526c6a96d2bdea74743bbe7bd65c154a4237b9855972a318e4f54d3be44c53b7282ab2419350a420b128b0bf03c1de315155d1d0f02636e274", &(0x7f0000000300)="8f45fc4861090a8f40a6f7fed2f73037d8c0463ec7eb8a59da7bdc1b76147320e8a90cbbc5ab163e300540a0c66045c693187c1acfe3e835a8bc5fa37f68a0eba3f0be826cc6edb1830a51a8bfce7c061eb218fbb6b678cd75c209867ac6e834d4c56ee6c8c6d17afa8c39edbb8db1cf4f56a6edaa54760751689db9d990f070cbcafd9c8b0080514068d343af09b42f6c236545bf869bf46b00fe94795e1218a849850279fbc268dc7b64cb30689f8570d863c3fc71b925957de8672ea00f435837f6d92983dd8cab6e65cd1beaecd7677ec156df5cc4bb2774558e8e1ee57f10b37a2c2dfde933894f25c75519", 0x4, r2}, 0x38) 09:02:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000040)=""/4096, 0x1000}, {&(0x7f0000001040)=""/159, 0x9f}, {&(0x7f0000001100)=""/5, 0x5}, {&(0x7f0000001200)=""/133, 0x85}], 0x4, &(0x7f00000012c0)=""/92, 0x5c}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:23 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffffe4, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:24 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x11, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:24 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r2, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r1}, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000740)={r3, r4}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={&(0x7f0000000000)="28d68a8b2a8963211530a180bafa6f244076da8107630adaa30f04b1de384d321f89c590819d5fca62a401444b38c9c7383df6ed60dfd311c9d5fd420f30839b6e1bcd63fb1e17b23f3bf9bc923d784dd8ccf6e672aa92937ed04714d609585190a197a419a9a9c195dd1e16e2bab27a04f5b3233c34e3c4c1867d8ec9413174bf57af9f2a6a80b0257666ce13193d55e985b0a3d4758ef35fc33ad70c2c46c63197c989b333031672f46e38f0f4f9aac08c1adc98ff1f9f832e164ff9d1772d156263d377ad255a5d4d961890f8b24442f702ae54e120422f3e3235fbf4a61f0cda65c7b0b7928d98e3dd8fff229719d437c73f07be368d8ee9d79b9a", &(0x7f0000000100)=""/240, &(0x7f0000000200)="82381b379ac26adc56d3cc7691db9a0b05f1df7f482ac425aa9d50cbbcc459584ef866c78c459a8f4bd6ad5fcbed930b3d14ccd1779a2746fc689f84021de2120196d919be9f748714b4092991132dae068c4fb69a5c1cd105112d00f1f9c1a8a6aa54c9136093e14d4dc14b763903f8c1b34e46a584be2ec2f8a0a43e6edecf88cb73a6036580ed41368926621b033382f89018fbfd1d9745643fd3a16fe6a83f5a43e8ad794208526c6a96d2bdea74743bbe7bd65c154a4237b9855972a318e4f54d3be44c53b7282ab2419350a420b128b0bf03c1de315155d1d0f02636e274", &(0x7f0000000300)="8f45fc4861090a8f40a6f7fed2f73037d8c0463ec7eb8a59da7bdc1b76147320e8a90cbbc5ab163e300540a0c66045c693187c1acfe3e835a8bc5fa37f68a0eba3f0be826cc6edb1830a51a8bfce7c061eb218fbb6b678cd75c209867ac6e834d4c56ee6c8c6d17afa8c39edbb8db1cf4f56a6edaa54760751689db9d990f070cbcafd9c8b0080514068d343af09b42f6c236545bf869bf46b00fe94795e1218a849850279fbc268dc7b64cb30689f8570d863c3fc71b925957de8672ea00f435837f6d92983dd8cab6e65cd1beaecd7677ec156df5cc4bb2774558e8e1ee57f10b37a2c2dfde933894f25c75519", 0x4, r2}, 0x38) 09:02:24 executing program 2: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/136, 0x88}, {&(0x7f0000000140)=""/132, 0x84}], 0x2, &(0x7f0000000240)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}, 0x2022) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000003c0)=r0, 0x12) r2 = perf_event_open$cgroup(&(0x7f0000000400)={0x4, 0x80, 0x1, 0x2, 0x9, 0xdf, 0x0, 0x7e70282, 0x220, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, @perf_config_ext={0x6, 0x2}, 0x10100, 0x9, 0xffffffff, 0x3, 0x100, 0x7, 0x6, 0x0, 0x800, 0x0, 0x4cd}, r1, 0xd, 0xffffffffffffffff, 0xa) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', 0x0, 0x4}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 09:02:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:24 executing program 0: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:02:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:24 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f0000000900)=@abs, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000980)=""/47, 0x2f}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f00000009c0)=""/66, 0x42}, {&(0x7f0000000a40)=""/164, 0xa4}], 0x4, &(0x7f0000000b40)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c00)=r0, 0x12) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) recvmsg$unix(r1, &(0x7f00000008c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000740)=[{&(0x7f0000000080)=""/137, 0x89}, {&(0x7f0000000140)=""/208, 0xd0}, {&(0x7f0000000240)=""/197, 0xc5}, {&(0x7f0000000340)=""/143, 0x8f}, {&(0x7f0000000400)=""/98, 0x62}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f0000000580)=""/235, 0xeb}, {&(0x7f0000000680)=""/140, 0x8c}], 0x8, &(0x7f00000007c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf8}, 0x2000) 09:02:24 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r2, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r1}, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000740)={r3, r4}) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000400)={&(0x7f0000000000)="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", &(0x7f0000000100)=""/240, &(0x7f0000000200)="82381b379ac26adc56d3cc7691db9a0b05f1df7f482ac425aa9d50cbbcc459584ef866c78c459a8f4bd6ad5fcbed930b3d14ccd1779a2746fc689f84021de2120196d919be9f748714b4092991132dae068c4fb69a5c1cd105112d00f1f9c1a8a6aa54c9136093e14d4dc14b763903f8c1b34e46a584be2ec2f8a0a43e6edecf88cb73a6036580ed41368926621b033382f89018fbfd1d9745643fd3a16fe6a83f5a43e8ad794208526c6a96d2bdea74743bbe7bd65c154a4237b9855972a318e4f54d3be44c53b7282ab2419350a420b128b0bf03c1de315155d1d0f02636e274", &(0x7f0000000300)="8f45fc4861090a8f40a6f7fed2f73037d8c0463ec7eb8a59da7bdc1b76147320e8a90cbbc5ab163e300540a0c66045c693187c1acfe3e835a8bc5fa37f68a0eba3f0be826cc6edb1830a51a8bfce7c061eb218fbb6b678cd75c209867ac6e834d4c56ee6c8c6d17afa8c39edbb8db1cf4f56a6edaa54760751689db9d990f070cbcafd9c8b0080514068d343af09b42f6c236545bf869bf46b00fe94795e1218a849850279fbc268dc7b64cb30689f8570d863c3fc71b925957de8672ea00f435837f6d92983dd8cab6e65cd1beaecd7677ec156df5cc4bb2774558e8e1ee57f10b37a2c2dfde933894f25c75519", 0x4, r2}, 0x38) 09:02:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:24 executing program 0: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:02:25 executing program 0: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 09:02:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:25 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r2, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r1}, 0x8) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000740)={r3, r4}) 09:02:25 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0xc0081, 0x0) 09:02:25 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:25 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:25 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r2, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r2, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000700)={r1}, 0x8) 09:02:25 executing program 1: openat$ppp(0xffffffffffffff9c, 0x0, 0xc0081, 0x0) 09:02:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:25 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:26 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r1, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r2, 0x0, 0x0) 09:02:26 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'dummy0\x00', @random}) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x3, 0x6, 0x5, 0xc6, 0x0, 0x7, 0x420, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x3ff, 0x7f}, 0x800, 0x0, 0x4, 0x3, 0x3f, 0x5629, 0x9, 0x0, 0x4, 0x0, 0x1f}, 0xffffffffffffffff, 0xe, r0, 0xa) 09:02:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x7c, &(0x7f0000000040)}, 0x20) 09:02:26 executing program 1: openat$ppp(0xffffffffffffff9c, 0x0, 0xc0081, 0x0) 09:02:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r1, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) 09:02:26 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f0000000040)}, 0x20) 09:02:26 executing program 1: openat$ppp(0xffffffffffffff9c, 0x0, 0xc0081, 0x0) 09:02:26 executing program 2: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000280)={&(0x7f0000000000)="e4b96b85da2abec67a96509040ea940d8a0a5bac7ba3b7b612c8be1887f45603dd3bb60754bb7bace2743830880dea7730eed0dcf9ad77d026e99261177bba1a630b710925355a55b81f1d4abbaa6b4558f938e6a61e493dec45001f247061b78229dcff29810f19ac8967ac3ad9062666ed9bcd61c16483a12f792174eccc3c5794adc7a9ed34d80a9056250c6b0589542510f3a497a0c13b22b397a6ae5da8e8be3d78b7ea", &(0x7f00000000c0)=""/226, &(0x7f0000001200)="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", &(0x7f00000001c0)="af957d28ed7a5c6609d83a5474d844358ad76c14cd0339ee23364b4139afe14d8cd5d0afb9e1bafa56b0b68e6f0c55bfb76fb7016c57d0ed0c3a5366dd766de2f5f7903ed40448b8f25e9044d5b64e053cbbb244036d7e8fde1e4246a297b224a9ea99cedd2959ef1d2aa344e3c7611f70335e113083f8fe6f6a8c69e97bb4c60442feef149edebe81dc1e6a5309894721514a7d0d", 0x86ea, 0x1}, 0x38) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000480)={&(0x7f00000002c0)="d8d58890567a633688cca5c4c47d6acd3828a95e85595431a6e943c0ce46520bbf626d53f3133fe96bf5e1d49c5f46b2", &(0x7f0000000300)=""/163, &(0x7f00000003c0)="5bb20a7b045896c7a5894d7684a948e5d42ed0a7ec105ed38629dad4c7caaef7b8e183195ffad7740e3082fe6e541c7f12ffce9147c0fe4e35e5515188ad8df23d94f0d4e35f111ff035335f3d4c92a2ab95c102b9050e8bbfe6798f2c0f268a4b12b7e86398e5f4b9e68d2872fb892346", &(0x7f0000000440)="9dd35758af1dd617b7c71658a5b3d8570214cf9a5d2465da883df3d74e5b57a7985ab01d958425de80f5b845eb6253d842c903", 0x100, 0x1}, 0x38) 09:02:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:26 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0}, 0x20) 09:02:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r1, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f00000006c0)={&(0x7f00000004c0)=@name={0x1e, 0x2, 0x3, {{0x1, 0x4}, 0x3}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000500)="53936813187485a024e1ae94abc7962d77a0be0df76088e21be123f37e616c0dbe5e70185976600a9e0190a7fbd84e92a1ad89498e39fc75c3be9c0a809f5cc2b8ad6e", 0x43}], 0x1, &(0x7f00000005c0)="4c91ba33fcc077cb07e3eb73a3aab80f389b90efa73adbcb3c169ac0223b16d0417406b2b11b6de566e2fe0c3ca8452f89b2d090816b1980c586bf8d656209815d24e4607778069b4b38c32ceff37e57aa9f7408fceb5684ce856d160b776fb30038fa5f0fa4a1a73bf42a6c1641dc648a04cfe23d25cea227a1671ead93c9bfdb777d570a170a91bf42041d813cdb34a55f01116d11833e3496a01e1534fbd27e38905cd23fbe24238eab4ce4bc6f82d1a2bf1872b5e7403da7bd7f7aae01b1185ff6cd", 0xc4, 0x8000}, 0x20000080) 09:02:26 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) 09:02:26 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r2, 0xffffffffffffffff, 0x30}, 0x10) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x68, 0x7, 0x9, 0x9, 0x0, 0x7ff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x51020, 0x10000, 0x10000, 0x2, 0x7, 0x4, 0x2, 0x0, 0x252eba75, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x3, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r1, 0x1, r3, 0x7) 09:02:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200001da, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r1, 0x1, 0x1, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) 09:02:26 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x4, 0x1}}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000040)="82e170a1b4d95e52737aa37acb1fd7ce95ef9cf696fb3d52f890eee983ebb2462eef468f75dba8428f5e8fb1fea926bb", 0x30}], 0x1, &(0x7f00000000c0)="6c1e465e639e2e7d24ff2fd2121a74527d8254d5b73bae9e9e36ecb512d1622beeb11f97b97ab913f7236d66429474eb3abd62e7010cd350", 0x38, 0x2008880}, 0x20000001) 09:02:26 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) 09:02:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200001e5, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:26 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x7, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000140)=r0, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='rdma.current\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x1}, 0x1) 09:02:26 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002f00)={0x4, 0x6, 0x7, 0x8, 0x80, r0, 0x4, '\x00', 0x0, r1, 0x1, 0x1, 0x1}, 0x40) 09:02:26 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000001380), 0x0, 0x0) 09:02:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20000221, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0x100) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x1, 0x80, 0xff, 0xfb, 0x1f, 0x6, 0x0, 0x0, 0x100d0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x100, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x1000, 0x400, 0x5, 0x4, 0x800, 0x80000000, 0x6, 0x0, 0xcb4, 0x0, 0x1}) 09:02:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1000000, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:26 executing program 4: bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002ec0)='freezer.state\x00', 0x0, 0x0) 09:02:27 executing program 1: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r2, 0xffffffffffffffff, 0x30}, 0x10) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x68, 0x7, 0x9, 0x9, 0x0, 0x7ff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x51020, 0x10000, 0x10000, 0x2, 0x7, 0x4, 0x2, 0x0, 0x252eba75, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x3, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r1, 0x1, r3, 0x7) 09:02:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:27 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r2, 0xffffffffffffffff, 0x30}, 0x10) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x68, 0x7, 0x9, 0x9, 0x0, 0x7ff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x51020, 0x10000, 0x10000, 0x2, 0x7, 0x4, 0x2, 0x0, 0x252eba75, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x3, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r1, 0x1, r3, 0x7) 09:02:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:27 executing program 4: bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00'}, 0x10) 09:02:27 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r2, 0xffffffffffffffff, 0x30}, 0x10) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x68, 0x7, 0x9, 0x9, 0x0, 0x7ff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x51020, 0x10000, 0x10000, 0x2, 0x7, 0x4, 0x2, 0x0, 0x252eba75, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x3, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r1, 0x1, r3, 0x7) 09:02:27 executing program 1: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r2, 0xffffffffffffffff, 0x30}, 0x10) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x68, 0x7, 0x9, 0x9, 0x0, 0x7ff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x51020, 0x10000, 0x10000, 0x2, 0x7, 0x4, 0x2, 0x0, 0x252eba75, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x3, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r1, 0x1, r3, 0x7) 09:02:27 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_collapse_huge_page\x00'}, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000340)={0x5, 0x80, 0x0, 0x1, 0x7f, 0x6, 0x0, 0x5, 0x80184, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x3f, 0x4}, 0x400, 0x3, 0xb3ee, 0xe, 0x2, 0x20200000, 0x40, 0x0, 0x80000001, 0x0, 0x100000001}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x80, 0x81, 0x0, 0x8, 0xda, 0x0, 0x7d15e894, 0x2083, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x1123, 0x10000, 0x1f, 0x6, 0x38, 0x401, 0xa97, 0x0, 0x8, 0x0, 0x2}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x8) r2 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x8, 0x1f, 0x0, 0x8, 0x0, 0x7ff, 0x20408, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x80000001, 0x47ad55a9}, 0x22, 0x1, 0xffffab51, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x4, 0x0, 0x200}, r2, 0x3, r0, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='vnet_rx_stopped_ack\x00'}, 0x10) perf_event_open$cgroup(&(0x7f00000001c0)={0x3, 0x80, 0x3, 0x3, 0x1f, 0x2, 0x0, 0x4, 0x24000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000180), 0xe}, 0x0, 0x25, 0x2, 0x1, 0x21d, 0xd2, 0xef8, 0x0, 0x1, 0x0, 0x401}, r3, 0x4, r4, 0x8) 09:02:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:27 executing program 4: bpf$OBJ_GET_MAP(0x7, 0xfffffffffffffffd, 0x0) 09:02:27 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) close(r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0xdc, 0x4f, 0x81, 0x0, 0x0, 0x7fff, 0x421, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000000c0)}, 0x11030, 0xfff, 0x401, 0x0, 0x6, 0x6, 0x4, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x5, r2, 0x8) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x80, 0xc, 0x80, 0x1f, 0x88, 0x0, 0x4, 0x8080, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x80000001, 0x8000401}, 0x1c40, 0x1, 0x80000001, 0x6, 0x0, 0x40005, 0x807, 0x0, 0x9, 0x0, 0x3}, 0xffffffffffffffff, 0x8, r0, 0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x81) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xff) 09:02:27 executing program 1: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r2, 0xffffffffffffffff, 0x30}, 0x10) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x68, 0x7, 0x9, 0x9, 0x0, 0x7ff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x51020, 0x10000, 0x10000, 0x2, 0x7, 0x4, 0x2, 0x0, 0x252eba75, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x3, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r1, 0x1, r3, 0x7) 09:02:27 executing program 5: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r2, 0xffffffffffffffff, 0x30}, 0x10) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x68, 0x7, 0x9, 0x9, 0x0, 0x7ff, 0x1, 0xe, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x51020, 0x10000, 0x10000, 0x2, 0x7, 0x4, 0x2, 0x0, 0x252eba75, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x3, r0, 0x1) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r1, 0x1, r3, 0x7) 09:02:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xb, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 1: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r1, 0xffffffffffffffff, 0x30}, 0x10) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:27 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000500)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e21, 0x2}}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000080)="683b6f17055ea6652ae099a578e843056e7028", 0x13}, {&(0x7f00000000c0)="dddc977edddb0d6cb1a24e97cbb593ffe28c435bc721fbbcda98a0905ac5e1d2a17be12c05ef085b224aa5f96d2ac40a91f2d4b15c6bf07d990e", 0x3a}, {&(0x7f0000000100)="b952b3665884f3833d37f02aba21241ac892f2e1cd2301b4b010da7608de39a0841b574b13b9c160d756bf9083303334572b8eaa190435199e6d42508cda2b339e471d66d0823fa7bebc1b5b4e16f7b5f016b14d61a1620b04306d58283ec670be08120934ca19a050af2e3082272ca3ea26e4bdf01830c32359fb", 0x7b}, {&(0x7f0000000180)="4d3e993b658abd303ad29b6fc754d9c131885eabb760ba37130ef72150dd3bde8e3d7ed11cbf7f544d018c706f439f3203c805cd673c6bb174e924f0449a87d79c1bebc344ac1b292eae290f099f2367be27224b390cf5f6fe2df1f4f06e840bd0e4a7f92014e5e76ac39a13a9d071872abc40d9f9e5011bf57aafcae09143", 0x7f}, {&(0x7f0000000200)="f5f70e8a4e2258f38825ed712477e623e852a0180eec20708c62cc73d868cb677700aec24f51ca6f9b84650fc6d54f1ef8cff71f7425c21b718c8fc9240fb84c2d944b4825ae4f31b86cbb7a2a05254a018475dfcfec4023b2915989f37eef39e87d01a6486d94fa48", 0x69}, {&(0x7f0000000280)="28079a320b43a63bafdb48fcfd5dddac11ec35ae83e841bdb5c954801ce2a82fad01683c3fd0c8235e5cecf8ff9004d80cf401233db5506da67ee9f4cf185283b94b3211d2df83085cce394c63594ea084b62aba95fab0d6fc85372741c86c93fd58f0c84c89d688356826ed26128b3893785f8e58949ed635fc1b24d20ea8dc3709e82dc0bda11891ed0d332a4162d984ad3bef6dfbb5a311d23e06f2b232f3fa7ff6966f539e73b52ebbfd6b7169f3df959f005a222f7caf8dc9fc7df9136ec1703480fa77e33a06aa19eb6a575ffeb0562f15ffcb717201a12ab223cdaed96f1d7de31038253d1dd60abb", 0xec}], 0x6, &(0x7f0000000400)="5dd780df9cb5eace63c3707e5ba3bb13aa1798b7cbdb5fcfc94a21440a227263ca62a81f4e638fb9f5713c2053bced61dc44218dd911925bc1ebe2f2ed5e333409d83507845d3698a59e03abb41aec53ef04a9f239ee02b20e0989ed253d707ac280bcf119e4e9b8d2756e8afc928ad1c7b05914e17ab7a0ef2d485a813cfc6c134a978903b21494b8703ac25cee6764f9c500be3a0ff4580e480a124622ebe3bac54667fedd7d206cdfee9aa49984020b877540bcd538205585bc62f7374dbacb969be25ab400ba9de3", 0xca, 0x20042}, 0xd) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xe, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x14}, 0x10) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:27 executing program 1: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup=r1, 0xffffffffffffffff, 0x30}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xf, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x2, &(0x7f0000000040)=@raw=[@func, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0}], &(0x7f0000000080)='GPL\x00', 0xffffff95, 0x0, 0x0, 0x41100, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x8}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x0, 0x7}, 0x10}, 0x78) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='rpc_stats_latency\x00'}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x49, 0x6, 0x0, 0x1, 0x0, 0x0, 0x44040, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3572, 0x0, @perf_config_ext={0x8, 0x5}, 0x10150, 0x7fffffff, 0x8, 0x5, 0x6, 0x2, 0x9, 0x0, 0x3, 0x0, 0x1000}, 0xffffffffffffffff, 0x9, r0, 0x0) 09:02:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 1: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x63, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:28 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:28 executing program 1: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:28 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfffffffffffff587) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1, &(0x7f0000000180)=""/164, 0xa4}, 0x40012120) 09:02:28 executing program 1: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:28 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000000, 0x4, @perf_config_ext={0x0, 0x1}, 0x40, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:28 executing program 1: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200001da, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:28 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1a}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) 09:02:28 executing program 1: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200001e5, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:28 executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xfffffffffffffffe) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:28 executing program 1: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x20000221, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:28 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x3, 0x80, 0x3, 0x7, 0x11, 0xe0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb5, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x8200, 0xffffffffffffffc1, 0x10001, 0x4, 0x20, 0x3, 0x200, 0x0, 0xbb, 0x0, 0x341}) 09:02:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:28 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:28 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x7) 09:02:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3fe, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:29 executing program 2: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x3, 0x6, 0x0, 0x400000000000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000100), 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 09:02:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2000025e, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:29 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x7, 0x80, 0x7f, 0x4, 0x3, 0x1, 0x0, 0x6, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x120, 0x100, 0x1, 0x5, 0x2, 0x2, 0x4, 0x0, 0x4, 0x0, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='([\x00') 09:02:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:29 executing program 2: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040), 0x6e, &(0x7f0000000400), 0x0, &(0x7f0000000480)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000580)={r0, 0x6, 0x1, 0x9, &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x3}, 0x20) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2000025f, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:29 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:29 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x8, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, r1, 0x0, r0, 0x8) 09:02:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:29 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x8, 0xffffffffffffffff, 0xa) 09:02:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:29 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x8, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, r1, 0x0, r0, 0x8) 09:02:29 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x3}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x4, 0x80, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000080)=""/156, 0x9c}, {&(0x7f0000000140)=""/148, 0x94}, {&(0x7f0000000200)=""/132, 0x84}, {&(0x7f00000002c0)=""/167, 0xa7}], 0x4, &(0x7f00000003c0)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x40000000) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 09:02:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:30 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x8, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, r1, 0x0, r0, 0x8) 09:02:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:30 executing program 2: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x3, 0x80, 0x8, 0x52, 0x80, 0x9, 0x0, 0x1, 0x18, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f0000000600), 0x807c16b39d4b12b8}, 0x6002, 0x9, 0x9, 0x4, 0x1, 0x7fff, 0x4, 0x0, 0xffffff33, 0x0, 0x7ff}, 0xffffffffffffffff, 0x3, r0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) socketpair(0x1f, 0x800, 0xbbe1, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000005c0)={&(0x7f0000000140), 0x6e, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/232, 0xe8}, {&(0x7f00000002c0)=""/141, 0x8d}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000000380)=""/134, 0x86}, {&(0x7f0000000440)=""/232, 0xe8}], 0x5}, 0x101) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x1f, 0xb4, 0x0, 0x5, 0x0, 0x8, 0x8, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x650, 0x4, @perf_config_ext={0x1, 0x9}, 0x4000, 0xfffffffffffffff9, 0x8, 0x5, 0x9, 0x33, 0x2, 0x0, 0xf692, 0x0, 0x8}, r1, 0x4, r2, 0x0) 09:02:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:30 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x8, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, r1, 0x0, r0, 0x8) 09:02:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x5}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:30 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:30 executing program 0: r0 = perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x8, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, r0, 0x8) 09:02:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x1, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x7, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x80, 0x8, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:30 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000002c300)={0x0, 0x4, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1f}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000280)='syzkaller\x00', 0x9, 0xde, &(0x7f00000002c0)=""/222, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000002c280)={0x0, 0x2}, 0x8, 0x10, &(0x7f000002c2c0)={0x1, 0xb, 0x6, 0x80000000}, 0x10}, 0x78) 09:02:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x55, 0x9, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa68ecaf732085b19, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) 09:02:30 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) r0 = socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) sendmsg(r1, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r2}) 09:02:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x5, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x55, 0x9, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa68ecaf732085b19, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) 09:02:30 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) r0 = socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) sendmsg(r1, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r2}) 09:02:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x8}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:31 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x55, 0x9, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa68ecaf732085b19, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) 09:02:31 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) r0 = socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) sendmsg(r1, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r2}) 09:02:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xa}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:31 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:31 executing program 5: r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x55, 0x9, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa68ecaf732085b19, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) 09:02:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:31 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)) 09:02:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x80, 0x8, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xe}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:31 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x55, 0x9, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0008, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x8, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:31 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x10}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:31 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:31 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) socket$kcm(0x29, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x48}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:31 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:31 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) socket$kcm(0x29, 0x6, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4c}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:31 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:31 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) socket$kcm(0x29, 0x6, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:31 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x55, 0x9, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x63}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:32 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) socket$kcm(0x29, 0x6, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x68}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x9, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:32 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0xffffffffffffffff, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x1, 0xc, 0x100, 0x400}, 0x10}, 0x78) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6c}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:32 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, 0x1}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x86, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x74}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:32 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 09:02:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7a}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xb1}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:32 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x300}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2}, 0x20) 09:02:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x500}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:33 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x600}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x700}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xa00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:33 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:33 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:33 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:34 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xe00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000200)=@caif, 0x80, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:34 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x3f00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, 0x0, 0x1) 09:02:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:34 executing program 4: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, 0x0, 0x1) 09:02:34 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4800}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, 0x0, 0x1) 09:02:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:34 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4c00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:34 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000280)="511e7e05e1f8a7cf1f58e1567e0aa43a32d3dbc8e2d4b7d7af918fb293026765202de09f3db6e0fb7a8ce74bc19a427ebb80e5566ee9c55c5ce48346ce48e80d8b32522b5df5ce1e494fe11c4442a1439cebd3d0deb538a21f90bb02c3e1cbba826b1ff1ed513f1c18c879cceb45846f1b203a25df4444bcc530d6414d9a187087e5dffcbabfdbb6b3c3b555eb3323ae47e099798afed800", 0x98}, {&(0x7f0000000340)="01fc80b1d659b936eb29d9e6831d8e250fe31c30fba5acd2040161b354fbdc352400f94b2087ded437f5a1a89c9c8c4f16a1f480dbd586d267565a218e649368af49892c0e7de46ff600369c6df1ca13292a4545699d0d95fb59c11017d2e4da16d688a8e9f2f17aae5452cae044b66abe481c1197dc8abb64db64a55f75ec58f2f6a460f1789707eeb16004f66280b3d1836357e69ae109bd0585fb72257cbc8e139e0afdae4cc886c91447286a5c0347149aa33b62aa6a00081f1b2b8493c53f18227c81b6c161f5655d7b52064ddf5bcef3141b03ab9fe21fa58d8607", 0xde}, {&(0x7f0000000440)="7f185290d85ef68d0dccf5d2715484a8dc77ff5214eebda2faf6118cacd8de1d6ea0c2ff91644199b6809ade68e93c2d21a044dc3bb77734a924465590ca8f15791f78235da9dd36c01fb3475693a0995232175884355317a8044427c3551c8549cffcea1152aa01fd603db9c7217effc36b2ca86b842cc8965cf62ec36676128ab27342cf04b3cfadc6aba9b9a93cf8d42578889b48041af4341c582308d9902a61cfced085c89aa1e491d99d046985ebd2dd200a3454084b8533aede842e4adbed08168a06b17bc4549f7fd5773f4ed139473de5e3003aaf70e2475ce9dd56", 0xe0}], 0x3, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6300}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:34 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:34 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x1) 09:02:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6800}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 09:02:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6c00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:35 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7400}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 09:02:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7a00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) 09:02:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7fff}, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[{0x98, 0x10c, 0x2, "65e9434abd5dae54918a44c91c342ae395ff725d36593548e44adc98ffa00713ee63c97bc1960d10bdb46476d22952b6f49b52f1c5858b8466191b98c8145adc8ef4225f10e45feb64341f4fee22ba6e24ecff0eed5ac6475ba96485e8405f1d09967b5afd8f944497cebc7b05db78782cd4ed346aa29e3e63310dd783bbf8ea79aa07"}, {0xe8, 0xff, 0x2, "60219ba5227b8074428562a26f55a27cdf13bde8755a2ebaad18eea108b431601ba785eecd3df11f45ff67707ffabb9cd0b9e5721f7b85aa3da554a2ec1ef4c272f56c05b3b30e17e05b05792a553fe8f22578f1ad58902156a52420010b3cd56b7164b08e16d67a22392f5f91548d7a5126fec7a725732f710f8016448bb09e0f6427db58e0e7aaaed5465b7f3ca4ce1397ab966682d6b41cf41652a14f629471c683d07c776785bf4459d9447e79befb93aeba3cafed9501e735ee67213ab4f499eea1ce0d45dc929b214d599a7dca4029074e7fba"}, {0x78, 0x108, 0xf4b7, "f23a25db8871d74dccfcd4b16434bdb68cfb062c03e91067d0c99619a87a6c0fa80b4482b59ab4c90ad7d3431bc4507e3dd9d6187ae9d270dd4cfdef79a7de0ac2cbd8c9d4e4a8713b2588206f0978c935ba8828ff00c3940e01f7684a82944ef7ffa4ea7f327c"}, {0x28, 0x191, 0x1, "b58cef04370a046326a9d7f0afd1e87e241ba0a8633b4f"}], 0x220}, 0x1) 09:02:35 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xb100}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:35 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xfffff}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x400000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x80ffff}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:36 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xffffff}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:36 executing program 2: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:36 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x2000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x0, 0xa4, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0xb1, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x3000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:37 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x5000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:37 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x4, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) 09:02:37 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x3, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x8000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0xfff, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xa000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x7) 09:02:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x351d, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78d, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xe000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x10000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x265}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:38 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x3f000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:38 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) 09:02:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x48000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) 09:02:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4c000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x63000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x68000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6c000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:39 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x74000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:39 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7a000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:39 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xb1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 1: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xe4ffffff}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xffff0f00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xffff8000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:40 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xffffff00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:40 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x21}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xffffffe4}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x74000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:40 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa88c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x3}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x4}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x5}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x7) 09:02:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x6}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:41 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x7}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5e, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x8}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:41 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r1, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) 09:02:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:41 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xa}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:41 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r1, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) 09:02:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:42 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:42 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r1, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) 09:02:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xc}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfff}, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:42 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:42 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) syz_open_procfs$namespace(r1, 0x0) 09:02:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xe}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10100, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:42 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) 09:02:42 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x10}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:42 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0x0, 0x0) 09:02:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x200, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:42 executing program 4: bpf$BPF_BTF_LOAD(0x23, 0x0, 0x0) 09:02:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:42 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0x0, 0x0) 09:02:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x48}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 4: bpf$BPF_BTF_LOAD(0x23, 0x0, 0x0) 09:02:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:42 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)) syz_open_procfs$namespace(0x0, 0x0) 09:02:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:42 executing program 4: bpf$BPF_BTF_LOAD(0x23, 0x0, 0x0) 09:02:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x4c}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:42 executing program 1: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) r0 = getpid() syz_open_procfs$namespace(r0, 0x0) 09:02:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x63}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:42 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:42 executing program 1: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) 09:02:42 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:43 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x68}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 1: getpid() syz_open_procfs$namespace(0x0, 0x0) 09:02:43 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 1: getpid() syz_open_procfs$namespace(0x0, 0x0) 09:02:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x6c}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:43 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:43 executing program 1: getpid() syz_open_procfs$namespace(0x0, 0x0) 09:02:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x74}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:43 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x7a}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xb1}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 5: ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000000)=""/227) bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x11d020, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x8100, 0x0) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000180)) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 09:02:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x7) 09:02:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x300}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x9, 0x0, 0x3, 0x0, 0x7f5d7a69}, r0, 0x1, 0xffffffffffffffff, 0x7) 09:02:43 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:43 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 4: bpf$BPF_BTF_LOAD(0x21, 0x0, 0x0) 09:02:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x500}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:43 executing program 1: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 09:02:44 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:44 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x600}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 4: bpf$BPF_BTF_LOAD(0x21, 0x0, 0x0) 09:02:44 executing program 1: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 09:02:44 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x700}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 09:02:44 executing program 4: bpf$BPF_BTF_LOAD(0x21, 0x0, 0x0) 09:02:44 executing program 1: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 09:02:44 executing program 5: bpf$BPF_BTF_LOAD(0x16, 0x0, 0x0) 09:02:44 executing program 0: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 09:02:44 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xa00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:44 executing program 5: bpf$BPF_BTF_LOAD(0x16, 0x0, 0x0) 09:02:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xc00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 0: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 09:02:44 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:44 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:44 executing program 5: bpf$BPF_BTF_LOAD(0x16, 0x0, 0x0) 09:02:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xe00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 0: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 09:02:44 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:44 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:44 executing program 2: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 09:02:44 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:44 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:44 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:44 executing program 2: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 09:02:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x3f00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:44 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:44 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:44 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:44 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:44 executing program 2: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 09:02:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x4000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:44 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:44 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xa00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x4800}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:45 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:45 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x4c00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x6300}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:45 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 09:02:45 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:45 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x6800}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 1: bpf$BPF_BTF_LOAD(0xf, 0x0, 0x0) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 09:02:45 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:45 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 1: bpf$BPF_BTF_LOAD(0xf, 0x0, 0x0) 09:02:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x6c00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 09:02:45 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400001, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:45 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x7400}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 1: bpf$BPF_BTF_LOAD(0xf, 0x0, 0x0) 09:02:45 executing program 0: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 09:02:45 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 09:02:45 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400001, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:45 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:45 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 09:02:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x7a00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:45 executing program 0: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 09:02:45 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:45 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400001, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:46 executing program 0: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 09:02:46 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xb100}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:46 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:46 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:46 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2}, 0x20) 09:02:46 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:46 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x3}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400001, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x4}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400001, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x5}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 4: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 09:02:46 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 2: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:46 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:46 executing program 4: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 09:02:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:46 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:46 executing program 4: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 09:02:46 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:47 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x7}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:47 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 09:02:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:47 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:47 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x8}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 09:02:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:47 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:47 executing program 2: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 09:02:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0xa}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 09:02:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:47 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0xc}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:47 executing program 2: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 09:02:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:47 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0xe}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 2: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 09:02:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:47 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x10}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:47 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:47 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x48}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:47 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:47 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:48 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 4: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 09:02:48 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x4c}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:48 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:48 executing program 4: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 09:02:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x63}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x68}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:48 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:48 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 4: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 09:02:48 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:48 executing program 0: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x6c}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:48 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x74}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:48 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:48 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x7a}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:48 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:49 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0xb1}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 09:02:49 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:49 executing program 0: bpf$BPF_BTF_LOAD(0x4, 0x0, 0x0) 09:02:49 executing program 1: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r4) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:49 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 09:02:49 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:49 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:49 executing program 0: bpf$BPF_BTF_LOAD(0x4, 0x0, 0x0) 09:02:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 09:02:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:49 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:49 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 0: bpf$BPF_BTF_LOAD(0x4, 0x0, 0x0) 09:02:50 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x4}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:50 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:50 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x5}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:50 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:50 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x6}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 5: perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 09:02:50 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:50 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x7}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:50 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x110, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, @perf_bp={&(0x7f0000000000), 0x6}, 0x2c, 0x2, 0x800, 0x0, 0x8, 0x7fffffff, 0x8, 0x0, 0x9, 0x0, 0xe81}, r0, 0x1, 0xffffffffffffffff, 0x8) 09:02:50 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg(0xffffffffffffffff, &(0x7f000000b5c0)={&(0x7f000000b1c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000b480)=[{&(0x7f000000b240)=""/172, 0xac}, {&(0x7f000000b300)=""/67, 0x43}, {&(0x7f000000b380)=""/91, 0x5b}, {&(0x7f000000b400)=""/118, 0x76}], 0x4, &(0x7f000000b4c0)=""/248, 0xf8}, 0x60) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f000000b600)='cpuacct.usage_user\x00', 0x0, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f000000b6c0), 0x8) bpf$PROG_LOAD(0x5, &(0x7f000000b700)={0x18, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}], &(0x7f0000000080)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, 0xd, r2, 0x8, &(0x7f000000b640)={0x3}, 0x8, 0x10, &(0x7f000000b680)={0x2, 0x5, 0x6, 0x100}, 0x10, 0xffffffffffffffff, r3}, 0x78) 09:02:50 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x8}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:50 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r4) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:50 executing program 5: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r4) close(r2) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:50 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0}, 0x20) 09:02:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xa}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:02:50 executing program 5: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r4) close(r2) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xc}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:51 executing program 0: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r4) close(r2) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:51 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xe}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 425.157624][ T3214] FAULT_INJECTION: forcing a failure. [ 425.157624][ T3214] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 425.173351][ T3214] CPU: 1 PID: 3214 Comm: syz-executor.5 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 425.183454][ T3214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.193524][ T3214] Call Trace: [ 425.196810][ T3214] dump_stack_lvl+0xcd/0x134 [ 425.201424][ T3214] should_fail.cold+0x5/0xa [ 425.205953][ T3214] _copy_from_user+0x2c/0x180 [ 425.210740][ T3214] __sys_bpf+0x2ed/0x5410 [ 425.215091][ T3214] ? ksys_write+0x212/0x250 [ 425.219641][ T3214] ? bpf_link_get_from_fd+0x110/0x110 [ 425.225120][ T3214] ? rcu_read_lock_sched_held+0xd/0x70 [ 425.230619][ T3214] ? lock_release+0x522/0x720 [ 425.236134][ T3214] ? fsnotify+0x1050/0x1050 [ 425.240664][ T3214] ? ksys_write+0x12d/0x250 [ 425.245622][ T3214] ? rcu_read_lock_sched_held+0xd/0x70 [ 425.251274][ T3214] ? lock_acquire+0x442/0x510 [ 425.256244][ T3214] ? lock_release+0x522/0x720 [ 425.260938][ T3214] ? trace_hardirqs_on+0x38/0x1c0 [ 425.265996][ T3214] __x64_sys_bpf+0x75/0xb0 [ 425.270435][ T3214] ? syscall_enter_from_user_mode+0x21/0x70 [ 425.276358][ T3214] do_syscall_64+0x35/0xb0 [ 425.280913][ T3214] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 425.286829][ T3214] RIP: 0033:0x4665e9 [ 425.290937][ T3214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 425.311259][ T3214] RSP: 002b:00007f76d0966188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 425.319903][ T3214] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 425.328063][ T3214] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000004 [ 425.336170][ T3214] RBP: 00007f76d09661d0 R08: 0000000000000000 R09: 0000000000000000 [ 425.344327][ T3214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.352595][ T3214] R13: 00007ffde2a3f49f R14: 00007f76d0966300 R15: 0000000000022000 09:02:51 executing program 0 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:51 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r4) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x10}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:51 executing program 5 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x48}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 425.798033][ T3226] FAULT_INJECTION: forcing a failure. [ 425.798033][ T3226] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 425.824714][ T3228] FAULT_INJECTION: forcing a failure. [ 425.824714][ T3228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 425.852839][ T3228] CPU: 0 PID: 3228 Comm: syz-executor.5 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 425.863031][ T3228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.873095][ T3228] Call Trace: [ 425.876468][ T3228] dump_stack_lvl+0xcd/0x134 [ 425.881086][ T3228] should_fail.cold+0x5/0xa [ 425.885614][ T3228] _copy_to_user+0x2c/0x150 [ 425.890289][ T3228] simple_read_from_buffer+0xcc/0x160 [ 425.896220][ T3228] proc_fail_nth_read+0x187/0x220 [ 425.901448][ T3228] ? proc_fault_inject_read+0x220/0x220 [ 425.907272][ T3228] ? security_file_permission+0x248/0x560 [ 425.913103][ T3228] ? proc_fault_inject_read+0x220/0x220 [ 425.918708][ T3228] vfs_read+0x1b5/0x570 [ 425.923243][ T3228] ksys_read+0x12d/0x250 [ 425.927503][ T3228] ? vfs_write+0xa40/0xa40 [ 425.931942][ T3228] ? syscall_enter_from_user_mode+0x21/0x70 [ 425.937876][ T3228] do_syscall_64+0x35/0xb0 [ 425.942405][ T3228] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 425.948578][ T3228] RIP: 0033:0x41936c [ 425.952492][ T3228] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 425.972492][ T3228] RSP: 002b:00007f76d0966170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 425.980916][ T3228] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 425.989242][ T3228] RDX: 000000000000000f RSI: 00007f76d09661e0 RDI: 0000000000000003 09:02:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) 09:02:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x4c}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 425.997685][ T3228] RBP: 00007f76d09661d0 R08: 0000000000000000 R09: 0000000000000000 [ 426.005838][ T3228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.013838][ T3228] R13: 00007ffde2a3f49f R14: 00007f76d0966300 R15: 0000000000022000 [ 426.022344][ T3226] CPU: 1 PID: 3226 Comm: syz-executor.0 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 426.032721][ T3226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.042885][ T3226] Call Trace: [ 426.046163][ T3226] dump_stack_lvl+0xcd/0x134 [ 426.050871][ T3226] should_fail.cold+0x5/0xa [ 426.055394][ T3226] _copy_from_user+0x2c/0x180 [ 426.060088][ T3226] __sys_bpf+0x2ed/0x5410 [ 426.064429][ T3226] ? ksys_write+0x212/0x250 [ 426.069046][ T3226] ? bpf_link_get_from_fd+0x110/0x110 [ 426.074431][ T3226] ? rcu_read_lock_sched_held+0xd/0x70 [ 426.079909][ T3226] ? lock_release+0x522/0x720 [ 426.084594][ T3226] ? fsnotify+0x1050/0x1050 [ 426.089729][ T3226] ? ksys_write+0x12d/0x250 [ 426.094344][ T3226] ? rcu_read_lock_sched_held+0xd/0x70 09:02:52 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f00000001c0)=""/178, 0x0, 0xb2, 0x1}, 0x20) [ 426.099928][ T3226] ? lock_acquire+0x442/0x510 [ 426.104822][ T3226] ? lock_release+0x522/0x720 [ 426.109528][ T3226] ? trace_hardirqs_on+0x38/0x1c0 [ 426.114571][ T3226] __x64_sys_bpf+0x75/0xb0 [ 426.119008][ T3226] ? syscall_enter_from_user_mode+0x21/0x70 [ 426.124956][ T3226] do_syscall_64+0x35/0xb0 [ 426.129739][ T3226] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 426.135650][ T3226] RIP: 0033:0x4665e9 [ 426.139651][ T3226] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 426.159462][ T3226] RSP: 002b:00007f0a9d414188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 426.168194][ T3226] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 426.176263][ T3226] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000006 [ 426.184250][ T3226] RBP: 00007f0a9d4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 426.192329][ T3226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 09:02:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x63}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 426.200399][ T3226] R13: 00007ffdb9e2fa3f R14: 00007f0a9d414300 R15: 0000000000022000 09:02:52 executing program 0 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 426.361072][ T3254] FAULT_INJECTION: forcing a failure. [ 426.361072][ T3254] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 426.377202][ T3254] CPU: 1 PID: 3254 Comm: syz-executor.0 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 426.387679][ T3254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.398012][ T3254] Call Trace: [ 426.401335][ T3254] dump_stack_lvl+0xcd/0x134 [ 426.405952][ T3254] should_fail.cold+0x5/0xa [ 426.410623][ T3254] _copy_to_user+0x2c/0x150 [ 426.415180][ T3254] simple_read_from_buffer+0xcc/0x160 [ 426.420938][ T3254] proc_fail_nth_read+0x187/0x220 [ 426.426079][ T3254] ? proc_fault_inject_read+0x220/0x220 [ 426.431747][ T3254] ? security_file_permission+0x248/0x560 [ 426.437569][ T3254] ? proc_fault_inject_read+0x220/0x220 [ 426.443122][ T3254] vfs_read+0x1b5/0x570 [ 426.447287][ T3254] ksys_read+0x12d/0x250 [ 426.451529][ T3254] ? vfs_write+0xa40/0xa40 [ 426.456037][ T3254] ? syscall_enter_from_user_mode+0x21/0x70 [ 426.462367][ T3254] do_syscall_64+0x35/0xb0 [ 426.467056][ T3254] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 426.473123][ T3254] RIP: 0033:0x41936c [ 426.477016][ T3254] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 426.496800][ T3254] RSP: 002b:00007f0a9d414170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 426.505388][ T3254] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 426.513365][ T3254] RDX: 000000000000000f RSI: 00007f0a9d4141e0 RDI: 0000000000000003 [ 426.521415][ T3254] RBP: 00007f0a9d4141d0 R08: 0000000000000000 R09: 0000000000000000 [ 426.529373][ T3254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.537338][ T3254] R13: 00007ffdb9e2fa3f R14: 00007f0a9d414300 R15: 0000000000022000 09:02:52 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000380)=r4) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x68}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:52 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:52 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x6c}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:52 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:52 executing program 0: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:52 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:53 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x74}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/178, 0x1a, 0xb2, 0x1}, 0x20) 09:02:53 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:53 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:53 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:53 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x7a}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:54 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xb1}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:54 executing program 0: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:54 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 09:02:54 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:54 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x300}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:55 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:55 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:55 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x500}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:55 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x600}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:55 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2}, 0x20) 09:02:55 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:56 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000300)) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x700}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:56 executing program 1 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:56 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:56 executing program 0: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:56 executing program 4 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:56 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:56 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 430.457313][ T3406] FAULT_INJECTION: forcing a failure. [ 430.457313][ T3406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 430.491119][ T3410] FAULT_INJECTION: forcing a failure. [ 430.491119][ T3410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 430.522926][ T3406] CPU: 1 PID: 3406 Comm: syz-executor.4 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 430.533300][ T3406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.543839][ T3406] Call Trace: [ 430.547158][ T3406] dump_stack_lvl+0xcd/0x134 [ 430.551767][ T3406] should_fail.cold+0x5/0xa [ 430.556324][ T3406] _copy_from_user+0x2c/0x180 [ 430.561284][ T3406] __sys_bpf+0x2ed/0x5410 [ 430.565917][ T3406] ? ksys_write+0x212/0x250 [ 430.570529][ T3406] ? bpf_link_get_from_fd+0x110/0x110 [ 430.576308][ T3406] ? rcu_read_lock_sched_held+0xd/0x70 [ 430.581795][ T3406] ? lock_release+0x522/0x720 [ 430.586478][ T3406] ? fsnotify+0x1050/0x1050 [ 430.591165][ T3406] ? ksys_write+0x12d/0x250 [ 430.595690][ T3406] ? rcu_read_lock_sched_held+0xd/0x70 [ 430.601167][ T3406] ? lock_acquire+0x442/0x510 [ 430.605856][ T3406] ? lock_release+0x522/0x720 [ 430.610553][ T3406] ? trace_hardirqs_on+0x38/0x1c0 [ 430.616201][ T3406] __x64_sys_bpf+0x75/0xb0 [ 430.620626][ T3406] ? syscall_enter_from_user_mode+0x21/0x70 [ 430.626543][ T3406] do_syscall_64+0x35/0xb0 [ 430.630979][ T3406] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 430.636988][ T3406] RIP: 0033:0x4665e9 [ 430.640891][ T3406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 430.660891][ T3406] RSP: 002b:00007f69f2bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 430.669593][ T3406] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 430.677577][ T3406] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 430.685573][ T3406] RBP: 00007f69f2bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 430.693636][ T3406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.701626][ T3406] R13: 00007fff29741e1f R14: 00007f69f2bff300 R15: 0000000000022000 [ 430.716829][ T3410] CPU: 0 PID: 3410 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 430.726929][ T3410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.737184][ T3410] Call Trace: [ 430.740460][ T3410] dump_stack_lvl+0xcd/0x134 [ 430.745666][ T3410] should_fail.cold+0x5/0xa [ 430.750272][ T3410] _copy_from_user+0x2c/0x180 [ 430.755293][ T3410] __sys_bpf+0x2ed/0x5410 [ 430.759615][ T3410] ? ksys_write+0x212/0x250 [ 430.764216][ T3410] ? bpf_link_get_from_fd+0x110/0x110 [ 430.769851][ T3410] ? rcu_read_lock_sched_held+0xd/0x70 [ 430.775338][ T3410] ? lock_release+0x522/0x720 [ 430.780029][ T3410] ? fsnotify+0x1050/0x1050 [ 430.784535][ T3410] ? ksys_write+0x12d/0x250 [ 430.789047][ T3410] ? rcu_read_lock_sched_held+0xd/0x70 [ 430.794506][ T3410] ? lock_acquire+0x442/0x510 [ 430.799285][ T3410] ? lock_release+0x522/0x720 [ 430.804244][ T3410] ? trace_hardirqs_on+0x38/0x1c0 [ 430.809358][ T3410] __x64_sys_bpf+0x75/0xb0 [ 430.814047][ T3410] ? syscall_enter_from_user_mode+0x21/0x70 [ 430.819977][ T3410] do_syscall_64+0x35/0xb0 [ 430.824997][ T3410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 430.830914][ T3410] RIP: 0033:0x4665e9 [ 430.835615][ T3410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 430.855507][ T3410] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 430.864261][ T3410] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 09:02:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xa00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 430.872221][ T3410] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 430.880182][ T3410] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 430.888229][ T3410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.896359][ T3410] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:02:57 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:57 executing program 0: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:57 executing program 4 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 431.133806][ T3428] FAULT_INJECTION: forcing a failure. [ 431.133806][ T3428] name failslab, interval 1, probability 0, space 0, times 0 [ 431.150246][ T3428] CPU: 0 PID: 3428 Comm: syz-executor.4 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 431.160384][ T3428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.170921][ T3428] Call Trace: [ 431.174207][ T3428] dump_stack_lvl+0xcd/0x134 [ 431.178973][ T3428] should_fail.cold+0x5/0xa [ 431.183499][ T3428] ? btf_new_fd+0x25c/0x2450 [ 431.188325][ T3428] should_failslab+0x5/0x10 [ 431.193037][ T3428] kmem_cache_alloc_trace+0x55/0x3c0 [ 431.198346][ T3428] btf_new_fd+0x25c/0x2450 [ 431.203003][ T3428] ? rcu_read_lock_sched_held+0xd/0x70 [ 431.208664][ T3428] ? lock_acquire+0x442/0x510 [ 431.213372][ T3428] ? rcu_read_lock_sched_held+0xd/0x70 [ 431.218859][ T3428] ? lock_release+0x522/0x720 [ 431.223554][ T3428] ? __might_fault+0xd3/0x180 [ 431.228254][ T3428] ? lock_downgrade+0x6e0/0x6e0 [ 431.233117][ T3428] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 431.239471][ T3428] ? btf_type_snprintf_show+0x140/0x140 [ 431.245213][ T3428] ? apparmor_capable+0x1d8/0x460 [ 431.250362][ T3428] ? security_capable+0x8f/0xc0 [ 431.255233][ T3428] __sys_bpf+0x1e4c/0x5410 [ 431.259679][ T3428] ? ksys_write+0x212/0x250 [ 431.264205][ T3428] ? bpf_link_get_from_fd+0x110/0x110 [ 431.269638][ T3428] ? rcu_read_lock_sched_held+0xd/0x70 [ 431.275287][ T3428] ? lock_release+0x522/0x720 [ 431.280253][ T3428] ? fsnotify+0x1050/0x1050 [ 431.284770][ T3428] ? ksys_write+0x12d/0x250 [ 431.289497][ T3428] ? rcu_read_lock_sched_held+0xd/0x70 [ 431.294977][ T3428] ? lock_acquire+0x442/0x510 [ 431.299667][ T3428] ? lock_release+0x522/0x720 [ 431.304368][ T3428] ? trace_hardirqs_on+0x38/0x1c0 [ 431.309505][ T3428] __x64_sys_bpf+0x75/0xb0 [ 431.314301][ T3428] ? syscall_enter_from_user_mode+0x21/0x70 [ 431.320480][ T3428] do_syscall_64+0x35/0xb0 [ 431.324919][ T3428] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 431.330811][ T3428] RIP: 0033:0x4665e9 [ 431.334869][ T3428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 431.354486][ T3428] RSP: 002b:00007f69f2bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 431.362908][ T3428] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 431.370890][ T3428] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 09:02:57 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:57 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xc00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:57 executing program 1 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:57 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 431.378867][ T3428] RBP: 00007f69f2bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 431.386851][ T3428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.394839][ T3428] R13: 00007fff29741e1f R14: 00007f69f2bff300 R15: 0000000000022000 09:02:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xe00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 431.464830][ T3440] FAULT_INJECTION: forcing a failure. [ 431.464830][ T3440] name failslab, interval 1, probability 0, space 0, times 0 [ 431.505568][ T3440] CPU: 0 PID: 3440 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 431.515689][ T3440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.525929][ T3440] Call Trace: [ 431.529271][ T3440] dump_stack_lvl+0xcd/0x134 [ 431.533890][ T3440] should_fail.cold+0x5/0xa [ 431.538427][ T3440] ? btf_new_fd+0x25c/0x2450 [ 431.543038][ T3440] should_failslab+0x5/0x10 [ 431.547659][ T3440] kmem_cache_alloc_trace+0x55/0x3c0 [ 431.552971][ T3440] btf_new_fd+0x25c/0x2450 [ 431.557417][ T3440] ? rcu_read_lock_sched_held+0xd/0x70 [ 431.563079][ T3440] ? lock_acquire+0x442/0x510 [ 431.567860][ T3440] ? rcu_read_lock_sched_held+0xd/0x70 [ 431.573351][ T3440] ? lock_release+0x522/0x720 [ 431.578049][ T3440] ? __might_fault+0xd3/0x180 [ 431.582989][ T3440] ? lock_downgrade+0x6e0/0x6e0 [ 431.587852][ T3440] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 431.594266][ T3440] ? btf_type_snprintf_show+0x140/0x140 [ 431.599899][ T3440] ? apparmor_capable+0x1d8/0x460 [ 431.605273][ T3440] ? security_capable+0x8f/0xc0 [ 431.610128][ T3440] __sys_bpf+0x1e4c/0x5410 [ 431.614554][ T3440] ? ksys_write+0x212/0x250 [ 431.619064][ T3440] ? bpf_link_get_from_fd+0x110/0x110 [ 431.624652][ T3440] ? rcu_read_lock_sched_held+0xd/0x70 [ 431.630126][ T3440] ? lock_release+0x522/0x720 [ 431.634893][ T3440] ? fsnotify+0x1050/0x1050 [ 431.639399][ T3440] ? ksys_write+0x12d/0x250 [ 431.644076][ T3440] ? rcu_read_lock_sched_held+0xd/0x70 [ 431.649570][ T3440] ? lock_acquire+0x442/0x510 [ 431.654238][ T3440] ? lock_release+0x522/0x720 [ 431.658911][ T3440] ? trace_hardirqs_on+0x38/0x1c0 [ 431.663952][ T3440] __x64_sys_bpf+0x75/0xb0 [ 431.668492][ T3440] ? syscall_enter_from_user_mode+0x21/0x70 [ 431.674650][ T3440] do_syscall_64+0x35/0xb0 [ 431.679147][ T3440] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 431.685223][ T3440] RIP: 0033:0x4665e9 [ 431.689108][ T3440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 431.710447][ T3440] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 431.719379][ T3440] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 431.727345][ T3440] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 431.735400][ T3440] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 431.743560][ T3440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 09:02:57 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 431.752847][ T3440] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:02:57 executing program 4 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:57 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3f00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:57 executing program 1 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:57 executing program 0: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 431.914198][ T3455] FAULT_INJECTION: forcing a failure. [ 431.914198][ T3455] name failslab, interval 1, probability 0, space 0, times 0 [ 431.948247][ T3455] CPU: 1 PID: 3455 Comm: syz-executor.4 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 431.958359][ T3455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.968597][ T3455] Call Trace: [ 431.971891][ T3455] dump_stack_lvl+0xcd/0x134 [ 431.976910][ T3455] should_fail.cold+0x5/0xa [ 431.981652][ T3455] ? btf_new_fd+0x4b9/0x2450 [ 431.986444][ T3455] should_failslab+0x5/0x10 [ 431.991076][ T3455] kmem_cache_alloc_trace+0x55/0x3c0 [ 431.996403][ T3455] btf_new_fd+0x4b9/0x2450 [ 432.001663][ T3455] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.007243][ T3455] ? lock_acquire+0x442/0x510 [ 432.011932][ T3455] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.017656][ T3455] ? lock_release+0x522/0x720 [ 432.022525][ T3455] ? __might_fault+0xd3/0x180 [ 432.027494][ T3455] ? lock_downgrade+0x6e0/0x6e0 [ 432.032370][ T3455] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 432.038816][ T3455] ? btf_type_snprintf_show+0x140/0x140 [ 432.044385][ T3455] ? apparmor_capable+0x1d8/0x460 [ 432.049950][ T3455] ? security_capable+0x8f/0xc0 [ 432.054817][ T3455] __sys_bpf+0x1e4c/0x5410 [ 432.059250][ T3455] ? ksys_write+0x212/0x250 [ 432.063782][ T3455] ? bpf_link_get_from_fd+0x110/0x110 [ 432.069256][ T3455] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.074860][ T3455] ? lock_release+0x522/0x720 [ 432.080417][ T3455] ? fsnotify+0x1050/0x1050 [ 432.084936][ T3455] ? ksys_write+0x12d/0x250 [ 432.089479][ T3455] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.094959][ T3455] ? lock_acquire+0x442/0x510 [ 432.100083][ T3455] ? lock_release+0x522/0x720 [ 432.104791][ T3455] ? trace_hardirqs_on+0x38/0x1c0 [ 432.109836][ T3455] __x64_sys_bpf+0x75/0xb0 [ 432.114344][ T3455] ? syscall_enter_from_user_mode+0x21/0x70 [ 432.120552][ T3455] do_syscall_64+0x35/0xb0 [ 432.124990][ T3455] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 432.130904][ T3455] RIP: 0033:0x4665e9 [ 432.134803][ T3455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 432.154431][ T3455] RSP: 002b:00007f69f2bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 432.162855][ T3455] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 432.170836][ T3455] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 432.178910][ T3455] RBP: 00007f69f2bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 432.186892][ T3455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.194860][ T3455] R13: 00007fff29741e1f R14: 00007f69f2bff300 R15: 0000000000022000 [ 432.212559][ T3459] FAULT_INJECTION: forcing a failure. [ 432.212559][ T3459] name failslab, interval 1, probability 0, space 0, times 0 [ 432.226375][ T3459] CPU: 1 PID: 3459 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 432.236479][ T3459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.246630][ T3459] Call Trace: [ 432.250062][ T3459] dump_stack_lvl+0xcd/0x134 [ 432.254706][ T3459] should_fail.cold+0x5/0xa [ 432.259238][ T3459] ? btf_new_fd+0x4b9/0x2450 [ 432.264027][ T3459] should_failslab+0x5/0x10 [ 432.268529][ T3459] kmem_cache_alloc_trace+0x55/0x3c0 [ 432.273829][ T3459] btf_new_fd+0x4b9/0x2450 [ 432.278245][ T3459] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.284050][ T3459] ? lock_acquire+0x442/0x510 [ 432.288980][ T3459] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.294436][ T3459] ? lock_release+0x522/0x720 [ 432.299107][ T3459] ? __might_fault+0xd3/0x180 [ 432.303872][ T3459] ? lock_downgrade+0x6e0/0x6e0 [ 432.308717][ T3459] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 432.314957][ T3459] ? btf_type_snprintf_show+0x140/0x140 [ 432.320675][ T3459] ? apparmor_capable+0x1d8/0x460 [ 432.325716][ T3459] ? security_capable+0x8f/0xc0 [ 432.330562][ T3459] __sys_bpf+0x1e4c/0x5410 [ 432.334975][ T3459] ? ksys_write+0x212/0x250 [ 432.339483][ T3459] ? bpf_link_get_from_fd+0x110/0x110 [ 432.345022][ T3459] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.350496][ T3459] ? lock_release+0x522/0x720 [ 432.355251][ T3459] ? fsnotify+0x1050/0x1050 [ 432.359750][ T3459] ? ksys_write+0x12d/0x250 [ 432.364255][ T3459] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.369712][ T3459] ? lock_acquire+0x442/0x510 [ 432.374738][ T3459] ? lock_release+0x522/0x720 [ 432.379419][ T3459] ? trace_hardirqs_on+0x38/0x1c0 [ 432.384439][ T3459] __x64_sys_bpf+0x75/0xb0 [ 432.388871][ T3459] ? syscall_enter_from_user_mode+0x21/0x70 [ 432.394955][ T3459] do_syscall_64+0x35/0xb0 [ 432.399648][ T3459] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 432.405536][ T3459] RIP: 0033:0x4665e9 [ 432.409424][ T3459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 432.429022][ T3459] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 432.437516][ T3459] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 432.445827][ T3459] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 432.454831][ T3459] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 432.462881][ T3459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.470839][ T3459] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:02:58 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:58 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x4000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:58 executing program 4 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:58 executing program 1 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x4800}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:58 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:58 executing program 0: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:58 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 432.710755][ T3481] FAULT_INJECTION: forcing a failure. [ 432.710755][ T3481] name failslab, interval 1, probability 0, space 0, times 0 [ 432.725568][ T3482] FAULT_INJECTION: forcing a failure. [ 432.725568][ T3482] name failslab, interval 1, probability 0, space 0, times 0 09:02:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x4c00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 432.765900][ T3482] CPU: 1 PID: 3482 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 432.776182][ T3482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.786342][ T3482] Call Trace: [ 432.789745][ T3482] dump_stack_lvl+0xcd/0x134 [ 432.794372][ T3482] should_fail.cold+0x5/0xa [ 432.799442][ T3482] ? kvmalloc_node+0x61/0xf0 [ 432.804053][ T3482] should_failslab+0x5/0x10 [ 432.808666][ T3482] __kmalloc_node+0x75/0x380 [ 432.813271][ T3482] kvmalloc_node+0x61/0xf0 [ 432.817715][ T3482] btf_new_fd+0x50a/0x2450 [ 432.822159][ T3482] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.827643][ T3482] ? lock_acquire+0x442/0x510 [ 432.832335][ T3482] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.837827][ T3482] ? lock_release+0x522/0x720 [ 432.842535][ T3482] ? __might_fault+0xd3/0x180 [ 432.847232][ T3482] ? lock_downgrade+0x6e0/0x6e0 [ 432.852209][ T3482] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 432.858560][ T3482] ? btf_type_snprintf_show+0x140/0x140 09:02:58 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 432.864132][ T3482] ? apparmor_capable+0x1d8/0x460 [ 432.869190][ T3482] ? security_capable+0x8f/0xc0 [ 432.874064][ T3482] __sys_bpf+0x1e4c/0x5410 [ 432.878674][ T3482] ? ksys_write+0x212/0x250 [ 432.883271][ T3482] ? bpf_link_get_from_fd+0x110/0x110 [ 432.889190][ T3482] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.897628][ T3482] ? lock_release+0x522/0x720 [ 432.902323][ T3482] ? fsnotify+0x1050/0x1050 [ 432.906858][ T3482] ? ksys_write+0x12d/0x250 [ 432.911384][ T3482] ? rcu_read_lock_sched_held+0xd/0x70 [ 432.916876][ T3482] ? lock_acquire+0x442/0x510 [ 432.921651][ T3482] ? lock_release+0x522/0x720 [ 432.926350][ T3482] ? trace_hardirqs_on+0x38/0x1c0 [ 432.931474][ T3482] __x64_sys_bpf+0x75/0xb0 [ 432.935904][ T3482] ? syscall_enter_from_user_mode+0x21/0x70 [ 432.941816][ T3482] do_syscall_64+0x35/0xb0 [ 432.946246][ T3482] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 432.952195][ T3482] RIP: 0033:0x4665e9 09:02:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x6300}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 432.956094][ T3482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 432.976929][ T3482] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 432.985369][ T3482] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 432.994230][ T3482] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 433.002210][ T3482] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 433.010717][ T3482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.019045][ T3482] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 [ 433.027036][ T3481] CPU: 0 PID: 3481 Comm: syz-executor.4 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 433.037213][ T3481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.047631][ T3481] Call Trace: [ 433.050922][ T3481] dump_stack_lvl+0xcd/0x134 [ 433.055714][ T3481] should_fail.cold+0x5/0xa [ 433.060244][ T3481] ? kvmalloc_node+0x61/0xf0 [ 433.064852][ T3481] should_failslab+0x5/0x10 [ 433.069486][ T3481] __kmalloc_node+0x75/0x380 [ 433.074220][ T3481] kvmalloc_node+0x61/0xf0 [ 433.078659][ T3481] btf_new_fd+0x50a/0x2450 [ 433.083089][ T3481] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.088583][ T3481] ? lock_acquire+0x442/0x510 [ 433.093630][ T3481] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.099109][ T3481] ? lock_release+0x522/0x720 [ 433.103805][ T3481] ? __might_fault+0xd3/0x180 [ 433.108708][ T3481] ? lock_downgrade+0x6e0/0x6e0 09:02:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:59 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00'}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:59 executing program 1 (fault-call:0 fault-nth:4): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 433.113574][ T3481] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 433.119831][ T3481] ? btf_type_snprintf_show+0x140/0x140 [ 433.125403][ T3481] ? apparmor_capable+0x1d8/0x460 [ 433.130449][ T3481] ? security_capable+0x8f/0xc0 [ 433.135406][ T3481] __sys_bpf+0x1e4c/0x5410 [ 433.139838][ T3481] ? ksys_write+0x212/0x250 [ 433.144565][ T3481] ? bpf_link_get_from_fd+0x110/0x110 [ 433.149957][ T3481] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.155525][ T3481] ? lock_release+0x522/0x720 [ 433.161456][ T3481] ? fsnotify+0x1050/0x1050 [ 433.166002][ T3481] ? ksys_write+0x12d/0x250 [ 433.170143][ T3499] FAULT_INJECTION: forcing a failure. [ 433.170143][ T3499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 433.170615][ T3481] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.189655][ T3481] ? lock_acquire+0x442/0x510 [ 433.194493][ T3481] ? lock_release+0x522/0x720 [ 433.199205][ T3481] ? trace_hardirqs_on+0x38/0x1c0 [ 433.204250][ T3481] __x64_sys_bpf+0x75/0xb0 [ 433.208682][ T3481] ? syscall_enter_from_user_mode+0x21/0x70 [ 433.214621][ T3481] do_syscall_64+0x35/0xb0 [ 433.219055][ T3481] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 433.225055][ T3481] RIP: 0033:0x4665e9 [ 433.228956][ T3481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 433.248862][ T3481] RSP: 002b:00007f69f2bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 433.257550][ T3481] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 433.265630][ T3481] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 433.273614][ T3481] RBP: 00007f69f2bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 433.281598][ T3481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.289749][ T3481] R13: 00007fff29741e1f R14: 00007f69f2bff300 R15: 0000000000022000 [ 433.297740][ T3499] CPU: 1 PID: 3499 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 433.307845][ T3499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.317999][ T3499] Call Trace: [ 433.321282][ T3499] dump_stack_lvl+0xcd/0x134 [ 433.325910][ T3499] should_fail.cold+0x5/0xa [ 433.330450][ T3499] _copy_from_user+0x2c/0x180 [ 433.335236][ T3499] btf_new_fd+0x112b/0x2450 [ 433.339849][ T3499] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.345415][ T3499] ? lock_acquire+0x442/0x510 [ 433.350217][ T3499] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.355703][ T3499] ? lock_release+0x522/0x720 [ 433.360393][ T3499] ? __might_fault+0xd3/0x180 [ 433.365088][ T3499] ? lock_downgrade+0x6e0/0x6e0 [ 433.369951][ T3499] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 433.376208][ T3499] ? btf_type_snprintf_show+0x140/0x140 [ 433.381786][ T3499] ? apparmor_capable+0x1d8/0x460 [ 433.386830][ T3499] ? security_capable+0x8f/0xc0 [ 433.391704][ T3499] __sys_bpf+0x1e4c/0x5410 [ 433.396135][ T3499] ? ksys_write+0x212/0x250 [ 433.400676][ T3499] ? bpf_link_get_from_fd+0x110/0x110 [ 433.406072][ T3499] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.411810][ T3499] ? lock_release+0x522/0x720 [ 433.416500][ T3499] ? fsnotify+0x1050/0x1050 [ 433.421100][ T3499] ? ksys_write+0x12d/0x250 [ 433.425627][ T3499] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.431104][ T3499] ? lock_acquire+0x442/0x510 [ 433.435800][ T3499] ? lock_release+0x522/0x720 [ 433.440581][ T3499] ? trace_hardirqs_on+0x38/0x1c0 [ 433.445619][ T3499] __x64_sys_bpf+0x75/0xb0 [ 433.450053][ T3499] ? syscall_enter_from_user_mode+0x21/0x70 [ 433.455971][ T3499] do_syscall_64+0x35/0xb0 [ 433.460594][ T3499] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 433.466690][ T3499] RIP: 0033:0x4665e9 [ 433.470615][ T3499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 433.490934][ T3499] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 433.499534][ T3499] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 433.507512][ T3499] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 09:02:59 executing program 4 (fault-call:0 fault-nth:4): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:59 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x6800}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:59 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 433.515593][ T3499] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 433.523668][ T3499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.531654][ T3499] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:02:59 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:02:59 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:02:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x6c00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:02:59 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 433.648681][ T3515] FAULT_INJECTION: forcing a failure. [ 433.648681][ T3515] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 433.707963][ T3515] CPU: 0 PID: 3515 Comm: syz-executor.4 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 433.718156][ T3515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.728224][ T3515] Call Trace: [ 433.731513][ T3515] dump_stack_lvl+0xcd/0x134 [ 433.736136][ T3515] should_fail.cold+0x5/0xa [ 433.740662][ T3515] _copy_from_user+0x2c/0x180 [ 433.745368][ T3515] btf_new_fd+0x112b/0x2450 [ 433.750683][ T3515] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.756349][ T3515] ? lock_acquire+0x442/0x510 [ 433.761071][ T3515] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.766901][ T3515] ? lock_release+0x522/0x720 [ 433.771683][ T3515] ? __might_fault+0xd3/0x180 [ 433.776381][ T3515] ? lock_downgrade+0x6e0/0x6e0 [ 433.781682][ T3515] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 433.788035][ T3515] ? btf_type_snprintf_show+0x140/0x140 [ 433.793713][ T3515] ? apparmor_capable+0x1d8/0x460 [ 433.798772][ T3515] ? security_capable+0x8f/0xc0 [ 433.803670][ T3515] __sys_bpf+0x1e4c/0x5410 [ 433.808154][ T3515] ? ksys_write+0x212/0x250 [ 433.812772][ T3515] ? bpf_link_get_from_fd+0x110/0x110 [ 433.818164][ T3515] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.823824][ T3515] ? lock_release+0x522/0x720 [ 433.828522][ T3515] ? fsnotify+0x1050/0x1050 [ 433.833048][ T3515] ? ksys_write+0x12d/0x250 [ 433.837584][ T3515] ? rcu_read_lock_sched_held+0xd/0x70 [ 433.843329][ T3515] ? lock_acquire+0x442/0x510 [ 433.848208][ T3515] ? lock_release+0x522/0x720 [ 433.852996][ T3515] ? trace_hardirqs_on+0x38/0x1c0 [ 433.858130][ T3515] __x64_sys_bpf+0x75/0xb0 [ 433.863325][ T3515] ? syscall_enter_from_user_mode+0x21/0x70 [ 433.869243][ T3515] do_syscall_64+0x35/0xb0 [ 433.873683][ T3515] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 433.879676][ T3515] RIP: 0033:0x4665e9 [ 433.883739][ T3515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:03:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x7400}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 433.903562][ T3515] RSP: 002b:00007f69f2bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 433.912245][ T3515] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 433.920498][ T3515] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 433.929011][ T3515] RBP: 00007f69f2bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 433.937186][ T3515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 433.945168][ T3515] R13: 00007fff29741e1f R14: 00007f69f2bff300 R15: 0000000000022000 09:03:00 executing program 1 (fault-call:0 fault-nth:5): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:00 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:00 executing program 0: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:00 executing program 4 (fault-call:0 fault-nth:5): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 434.066801][ T3534] FAULT_INJECTION: forcing a failure. [ 434.066801][ T3534] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.088208][ T3534] CPU: 0 PID: 3534 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 434.098571][ T3534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.109070][ T3534] Call Trace: [ 434.112361][ T3534] dump_stack_lvl+0xcd/0x134 [ 434.117062][ T3534] should_fail.cold+0x5/0xa [ 434.121586][ T3534] _copy_to_user+0x2c/0x150 [ 434.126114][ T3534] bpf_verifier_vlog+0x1b2/0x2e0 [ 434.131212][ T3534] __btf_verifier_log+0xbb/0xf0 [ 434.136083][ T3534] ? btf_id_cmp_func+0x90/0x90 [ 434.136299][ T3539] FAULT_INJECTION: forcing a failure. [ 434.136299][ T3539] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.140883][ T3534] ? lock_acquire+0x442/0x510 [ 434.140915][ T3534] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.140944][ T3534] ? lock_release+0x522/0x720 [ 434.140963][ T3534] ? lock_release+0x522/0x720 [ 434.140982][ T3534] btf_parse_hdr+0x392/0xc00 [ 434.178354][ T3534] ? btf_datasec_log+0xa0/0xa0 [ 434.183162][ T3534] btf_new_fd+0x5ae/0x2450 [ 434.187602][ T3534] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.193085][ T3534] ? lock_acquire+0x442/0x510 [ 434.197781][ T3534] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.203353][ T3534] ? lock_release+0x522/0x720 [ 434.208037][ T3534] ? __might_fault+0xd3/0x180 [ 434.212765][ T3534] ? lock_downgrade+0x6e0/0x6e0 [ 434.217628][ T3534] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 434.224170][ T3534] ? btf_type_snprintf_show+0x140/0x140 [ 434.229740][ T3534] ? apparmor_capable+0x1d8/0x460 [ 434.234805][ T3534] ? security_capable+0x8f/0xc0 [ 434.239670][ T3534] __sys_bpf+0x1e4c/0x5410 [ 434.244103][ T3534] ? ksys_write+0x212/0x250 [ 434.248641][ T3534] ? bpf_link_get_from_fd+0x110/0x110 [ 434.254023][ T3534] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.259500][ T3534] ? lock_release+0x522/0x720 [ 434.264286][ T3534] ? fsnotify+0x1050/0x1050 [ 434.268989][ T3534] ? ksys_write+0x12d/0x250 [ 434.273696][ T3534] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.279522][ T3534] ? lock_acquire+0x442/0x510 [ 434.284397][ T3534] ? lock_release+0x522/0x720 [ 434.289182][ T3534] ? trace_hardirqs_on+0x38/0x1c0 [ 434.294409][ T3534] __x64_sys_bpf+0x75/0xb0 [ 434.298870][ T3534] ? syscall_enter_from_user_mode+0x21/0x70 [ 434.304779][ T3534] do_syscall_64+0x35/0xb0 [ 434.309324][ T3534] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 434.315235][ T3534] RIP: 0033:0x4665e9 [ 434.319157][ T3534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 434.338859][ T3534] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 434.347274][ T3534] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 434.355253][ T3534] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 09:03:00 executing program 5: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x7a00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 434.363240][ T3534] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 434.371223][ T3534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.379368][ T3534] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xb100}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 434.411940][ T3539] CPU: 1 PID: 3539 Comm: syz-executor.4 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 434.422049][ T3539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.432115][ T3539] Call Trace: [ 434.435527][ T3539] dump_stack_lvl+0xcd/0x134 [ 434.440843][ T3539] should_fail.cold+0x5/0xa [ 434.445370][ T3539] _copy_to_user+0x2c/0x150 [ 434.449986][ T3539] bpf_verifier_vlog+0x1b2/0x2e0 [ 434.454957][ T3539] __btf_verifier_log+0xbb/0xf0 [ 434.459848][ T3539] ? btf_id_cmp_func+0x90/0x90 [ 434.465586][ T3539] ? lock_acquire+0x442/0x510 [ 434.470463][ T3539] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.475952][ T3539] ? lock_release+0x522/0x720 [ 434.480844][ T3539] ? lock_release+0x522/0x720 [ 434.485550][ T3539] btf_parse_hdr+0x392/0xc00 [ 434.490162][ T3539] ? btf_datasec_log+0xa0/0xa0 [ 434.495123][ T3539] btf_new_fd+0x5ae/0x2450 [ 434.499722][ T3539] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.505296][ T3539] ? lock_acquire+0x442/0x510 [ 434.510079][ T3539] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.515560][ T3539] ? lock_release+0x522/0x720 [ 434.520427][ T3539] ? __might_fault+0xd3/0x180 [ 434.525207][ T3539] ? lock_downgrade+0x6e0/0x6e0 [ 434.530941][ T3539] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 434.537208][ T3539] ? btf_type_snprintf_show+0x140/0x140 [ 434.543070][ T3539] ? apparmor_capable+0x1d8/0x460 [ 434.548145][ T3539] ? security_capable+0x8f/0xc0 [ 434.553157][ T3539] __sys_bpf+0x1e4c/0x5410 [ 434.557677][ T3539] ? ksys_write+0x212/0x250 [ 434.562223][ T3539] ? bpf_link_get_from_fd+0x110/0x110 [ 434.567787][ T3539] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.573263][ T3539] ? lock_release+0x522/0x720 [ 434.577964][ T3539] ? fsnotify+0x1050/0x1050 [ 434.582647][ T3539] ? ksys_write+0x12d/0x250 [ 434.587329][ T3539] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.592987][ T3539] ? lock_acquire+0x442/0x510 [ 434.597689][ T3539] ? lock_release+0x522/0x720 [ 434.602411][ T3539] ? trace_hardirqs_on+0x38/0x1c0 [ 434.607467][ T3539] __x64_sys_bpf+0x75/0xb0 [ 434.612095][ T3539] ? syscall_enter_from_user_mode+0x21/0x70 [ 434.618005][ T3539] do_syscall_64+0x35/0xb0 [ 434.622442][ T3539] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 434.628356][ T3539] RIP: 0033:0x4665e9 [ 434.632261][ T3539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 434.652421][ T3539] RSP: 002b:00007f69f2bff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 434.660848][ T3539] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 434.668850][ T3539] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 434.677180][ T3539] RBP: 00007f69f2bff1d0 R08: 0000000000000000 R09: 0000000000000000 [ 434.685176][ T3539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.693156][ T3539] R13: 00007fff29741e1f R14: 00007f69f2bff300 R15: 0000000000022000 09:03:00 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001740)={0x12, 0x8, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, [@ldst={0x1, 0x7aabfaae935f958c, 0x2, 0x0, 0x7, 0x50}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}]}, &(0x7f0000000400)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000000440)=""/4096, 0x0, 0x10, '\x00', 0x0, 0x13, r0, 0x8, &(0x7f0000001480)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000014c0)={0x2, 0x4, 0x1, 0x4}, 0x10, r1}, 0x78) r2 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:03:00 executing program 1 (fault-call:0 fault-nth:6): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xfffff}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:00 executing program 5: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:00 executing program 0: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 434.801265][ T3559] FAULT_INJECTION: forcing a failure. [ 434.801265][ T3559] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.816452][ T3559] CPU: 1 PID: 3559 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 434.826644][ T3559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.836734][ T3559] Call Trace: [ 434.840205][ T3559] dump_stack_lvl+0xcd/0x134 [ 434.845356][ T3559] should_fail.cold+0x5/0xa 09:03:00 executing program 5: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x400000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 434.849885][ T3559] _copy_to_user+0x2c/0x150 [ 434.854415][ T3559] bpf_verifier_vlog+0x1b2/0x2e0 [ 434.859377][ T3559] __btf_verifier_log+0xbb/0xf0 [ 434.864251][ T3559] ? btf_id_cmp_func+0x90/0x90 [ 434.869209][ T3559] ? kvmalloc_node+0x61/0xf0 [ 434.873995][ T3559] ? lock_acquire+0x442/0x510 [ 434.878711][ T3559] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.884540][ T3559] ? lock_release+0x522/0x720 [ 434.889497][ T3559] ? lock_release+0x522/0x720 [ 434.894291][ T3559] btf_parse_hdr+0x3d1/0xc00 09:03:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x80ffff}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 434.899512][ T3559] ? btf_datasec_log+0xa0/0xa0 [ 434.904692][ T3559] btf_new_fd+0x5ae/0x2450 [ 434.909134][ T3559] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.914881][ T3559] ? lock_acquire+0x442/0x510 [ 434.919669][ T3559] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.925272][ T3559] ? lock_release+0x522/0x720 [ 434.929970][ T3559] ? __might_fault+0xd3/0x180 [ 434.934673][ T3559] ? lock_downgrade+0x6e0/0x6e0 [ 434.939545][ T3559] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 434.945989][ T3559] ? btf_type_snprintf_show+0x140/0x140 [ 434.951656][ T3559] ? apparmor_capable+0x1d8/0x460 [ 434.956719][ T3559] ? security_capable+0x8f/0xc0 [ 434.961603][ T3559] __sys_bpf+0x1e4c/0x5410 [ 434.966190][ T3559] ? ksys_write+0x212/0x250 [ 434.970843][ T3559] ? bpf_link_get_from_fd+0x110/0x110 [ 434.977197][ T3559] ? rcu_read_lock_sched_held+0xd/0x70 [ 434.982793][ T3559] ? lock_release+0x522/0x720 [ 434.987704][ T3559] ? fsnotify+0x1050/0x1050 [ 434.992401][ T3559] ? ksys_write+0x12d/0x250 [ 434.997107][ T3559] ? rcu_read_lock_sched_held+0xd/0x70 [ 435.002792][ T3559] ? lock_acquire+0x442/0x510 [ 435.007500][ T3559] ? lock_release+0x522/0x720 [ 435.012287][ T3559] ? trace_hardirqs_on+0x38/0x1c0 [ 435.017377][ T3559] __x64_sys_bpf+0x75/0xb0 [ 435.021991][ T3559] ? syscall_enter_from_user_mode+0x21/0x70 [ 435.027920][ T3559] do_syscall_64+0x35/0xb0 [ 435.032447][ T3559] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 435.039289][ T3559] RIP: 0033:0x4665e9 [ 435.043194][ T3559] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 435.063629][ T3559] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 435.072230][ T3559] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 435.081503][ T3559] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 435.089756][ T3559] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 435.098275][ T3559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.106542][ T3559] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xffffff}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:01 executing program 0: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:01 executing program 5: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:01 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001700)={0xffffffffffffffff, 0xc0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=0x2, 0x0, 0x0, 0x0, &(0x7f0000001540)={0x1, 0x2}, 0x0, 0x0, &(0x7f0000001580)={0x0, 0x10, 0xa492, 0x108a}, &(0x7f00000015c0)=0x2000000000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=0x80000001}}, 0x10) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:03:01 executing program 1 (fault-call:0 fault-nth:7): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:01 executing program 5: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:01 executing program 0: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:01 executing program 4: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:01 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:01 executing program 5: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:01 executing program 0: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 435.699860][ T3590] FAULT_INJECTION: forcing a failure. [ 435.699860][ T3590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.750626][ T3590] CPU: 0 PID: 3590 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 435.761636][ T3590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.771901][ T3590] Call Trace: [ 435.775200][ T3590] dump_stack_lvl+0xcd/0x134 [ 435.779851][ T3590] should_fail.cold+0x5/0xa [ 435.784586][ T3590] _copy_to_user+0x2c/0x150 [ 435.789151][ T3590] bpf_verifier_vlog+0x1b2/0x2e0 [ 435.794218][ T3590] __btf_verifier_log+0xbb/0xf0 [ 435.799284][ T3590] ? btf_id_cmp_func+0x90/0x90 [ 435.804249][ T3590] ? lock_acquire+0x442/0x510 [ 435.808940][ T3590] ? rcu_read_lock_sched_held+0xd/0x70 [ 435.814433][ T3590] ? lock_release+0x522/0x720 [ 435.819363][ T3590] ? lock_release+0x522/0x720 [ 435.824063][ T3590] btf_parse_hdr+0x410/0xc00 [ 435.828678][ T3590] ? btf_datasec_log+0xa0/0xa0 [ 435.833473][ T3590] btf_new_fd+0x5ae/0x2450 [ 435.837910][ T3590] ? rcu_read_lock_sched_held+0xd/0x70 [ 435.843485][ T3590] ? lock_acquire+0x442/0x510 [ 435.848180][ T3590] ? rcu_read_lock_sched_held+0xd/0x70 [ 435.853662][ T3590] ? lock_release+0x522/0x720 [ 435.858623][ T3590] ? __might_fault+0xd3/0x180 [ 435.863406][ T3590] ? lock_downgrade+0x6e0/0x6e0 [ 435.868535][ T3590] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 435.874806][ T3590] ? btf_type_snprintf_show+0x140/0x140 [ 435.880387][ T3590] ? apparmor_capable+0x1d8/0x460 [ 435.885524][ T3590] ? security_capable+0x8f/0xc0 [ 435.890490][ T3590] __sys_bpf+0x1e4c/0x5410 [ 435.895807][ T3590] ? ksys_write+0x212/0x250 09:03:01 executing program 0: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 435.900339][ T3590] ? bpf_link_get_from_fd+0x110/0x110 [ 435.905989][ T3590] ? rcu_read_lock_sched_held+0xd/0x70 [ 435.911574][ T3590] ? lock_release+0x522/0x720 [ 435.916279][ T3590] ? fsnotify+0x1050/0x1050 [ 435.920809][ T3590] ? ksys_write+0x12d/0x250 [ 435.925336][ T3590] ? rcu_read_lock_sched_held+0xd/0x70 [ 435.930998][ T3590] ? lock_acquire+0x442/0x510 [ 435.935741][ T3590] ? lock_release+0x522/0x720 [ 435.940446][ T3590] ? trace_hardirqs_on+0x38/0x1c0 [ 435.945668][ T3590] __x64_sys_bpf+0x75/0xb0 09:03:02 executing program 0: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 435.950199][ T3590] ? syscall_enter_from_user_mode+0x21/0x70 [ 435.956388][ T3590] do_syscall_64+0x35/0xb0 [ 435.961027][ T3590] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 435.967042][ T3590] RIP: 0033:0x4665e9 [ 435.970960][ T3590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 435.990950][ T3590] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 09:03:02 executing program 0: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 435.999727][ T3590] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 436.008004][ T3590] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 436.016570][ T3590] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 436.025270][ T3590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.033429][ T3590] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:02 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001440)='cpuacct.stat\x00', 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:03:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:02 executing program 4: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:02 executing program 5: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:02 executing program 0: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:02 executing program 1 (fault-call:0 fault-nth:8): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:02 executing program 4: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:02 executing program 0: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 436.653992][ T3627] FAULT_INJECTION: forcing a failure. [ 436.653992][ T3627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 436.711826][ T3627] CPU: 1 PID: 3627 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 436.722033][ T3627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.732277][ T3627] Call Trace: [ 436.735572][ T3627] dump_stack_lvl+0xcd/0x134 [ 436.740288][ T3627] should_fail.cold+0x5/0xa [ 436.744825][ T3627] _copy_to_user+0x2c/0x150 [ 436.749356][ T3627] bpf_verifier_vlog+0x1b2/0x2e0 [ 436.754432][ T3627] __btf_verifier_log+0xbb/0xf0 [ 436.759393][ T3627] ? btf_id_cmp_func+0x90/0x90 [ 436.764180][ T3627] ? lock_acquire+0x442/0x510 [ 436.768871][ T3627] ? rcu_read_lock_sched_held+0xd/0x70 [ 436.774359][ T3627] ? lock_release+0x522/0x720 [ 436.779059][ T3627] ? lock_release+0x522/0x720 [ 436.783756][ T3627] btf_parse_hdr+0x451/0xc00 [ 436.788603][ T3627] ? btf_datasec_log+0xa0/0xa0 [ 436.793400][ T3627] btf_new_fd+0x5ae/0x2450 [ 436.797844][ T3627] ? rcu_read_lock_sched_held+0xd/0x70 [ 436.803508][ T3627] ? lock_acquire+0x442/0x510 [ 436.808381][ T3627] ? rcu_read_lock_sched_held+0xd/0x70 [ 436.813867][ T3627] ? lock_release+0x522/0x720 [ 436.818573][ T3627] ? __might_fault+0xd3/0x180 [ 436.823289][ T3627] ? lock_downgrade+0x6e0/0x6e0 [ 436.828159][ T3627] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 436.834423][ T3627] ? btf_type_snprintf_show+0x140/0x140 [ 436.840093][ T3627] ? apparmor_capable+0x1d8/0x460 [ 436.845154][ T3627] ? security_capable+0x8f/0xc0 [ 436.850301][ T3627] __sys_bpf+0x1e4c/0x5410 [ 436.854752][ T3627] ? ksys_write+0x212/0x250 [ 436.859375][ T3627] ? bpf_link_get_from_fd+0x110/0x110 [ 436.864942][ T3627] ? rcu_read_lock_sched_held+0xd/0x70 [ 436.870425][ T3627] ? lock_release+0x522/0x720 [ 436.875218][ T3627] ? fsnotify+0x1050/0x1050 [ 436.879936][ T3627] ? ksys_write+0x12d/0x250 [ 436.884648][ T3627] ? rcu_read_lock_sched_held+0xd/0x70 [ 436.890411][ T3627] ? lock_acquire+0x442/0x510 [ 436.895310][ T3627] ? lock_release+0x522/0x720 [ 436.900105][ T3627] ? trace_hardirqs_on+0x38/0x1c0 [ 436.905503][ T3627] __x64_sys_bpf+0x75/0xb0 [ 436.909954][ T3627] ? syscall_enter_from_user_mode+0x21/0x70 [ 436.915879][ T3627] do_syscall_64+0x35/0xb0 [ 436.920330][ T3627] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 436.926244][ T3627] RIP: 0033:0x4665e9 [ 436.930152][ T3627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 436.949949][ T3627] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 09:03:03 executing program 4: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:03 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x4000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 436.959238][ T3627] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 436.967399][ T3627] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 436.975384][ T3627] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 436.983367][ T3627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.991345][ T3627] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x5000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:03 executing program 0: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:03 executing program 2: bpf$MAP_LOOKUP_BATCH(0x2, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:03:03 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:03 executing program 1 (fault-call:0 fault-nth:9): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:03 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:03 executing program 0: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 437.547854][ T3665] FAULT_INJECTION: forcing a failure. [ 437.547854][ T3665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 437.576642][ T3665] CPU: 1 PID: 3665 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 437.586759][ T3665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.596828][ T3665] Call Trace: [ 437.600120][ T3665] dump_stack_lvl+0xcd/0x134 [ 437.604743][ T3665] should_fail.cold+0x5/0xa [ 437.609275][ T3665] _copy_to_user+0x2c/0x150 [ 437.613801][ T3665] bpf_verifier_vlog+0x1b2/0x2e0 [ 437.618760][ T3665] __btf_verifier_log+0xbb/0xf0 [ 437.623628][ T3665] ? btf_id_cmp_func+0x90/0x90 [ 437.628501][ T3665] ? lock_acquire+0x442/0x510 [ 437.633227][ T3665] ? rcu_read_lock_sched_held+0xd/0x70 [ 437.638711][ T3665] ? lock_release+0x522/0x720 [ 437.643405][ T3665] ? lock_release+0x522/0x720 [ 437.648117][ T3665] btf_parse_hdr+0x492/0xc00 [ 437.653000][ T3665] ? btf_datasec_log+0xa0/0xa0 [ 437.657795][ T3665] btf_new_fd+0x5ae/0x2450 [ 437.662593][ T3665] ? rcu_read_lock_sched_held+0xd/0x70 [ 437.668185][ T3665] ? lock_acquire+0x442/0x510 [ 437.672972][ T3665] ? rcu_read_lock_sched_held+0xd/0x70 [ 437.679095][ T3665] ? lock_release+0x522/0x720 [ 437.683794][ T3665] ? __might_fault+0xd3/0x180 [ 437.688873][ T3665] ? lock_downgrade+0x6e0/0x6e0 [ 437.693753][ T3665] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 437.700631][ T3665] ? btf_type_snprintf_show+0x140/0x140 [ 437.706301][ T3665] ? apparmor_capable+0x1d8/0x460 [ 437.711960][ T3665] ? security_capable+0x8f/0xc0 [ 437.716832][ T3665] __sys_bpf+0x1e4c/0x5410 [ 437.721445][ T3665] ? ksys_write+0x212/0x250 [ 437.725982][ T3665] ? bpf_link_get_from_fd+0x110/0x110 [ 437.731379][ T3665] ? rcu_read_lock_sched_held+0xd/0x70 [ 437.736979][ T3665] ? lock_release+0x522/0x720 [ 437.741673][ T3665] ? fsnotify+0x1050/0x1050 [ 437.746203][ T3665] ? ksys_write+0x12d/0x250 [ 437.751255][ T3665] ? rcu_read_lock_sched_held+0xd/0x70 [ 437.756967][ T3665] ? lock_acquire+0x442/0x510 [ 437.761783][ T3665] ? lock_release+0x522/0x720 [ 437.766488][ T3665] ? trace_hardirqs_on+0x38/0x1c0 [ 437.771536][ T3665] __x64_sys_bpf+0x75/0xb0 [ 437.776021][ T3665] ? syscall_enter_from_user_mode+0x21/0x70 [ 437.781950][ T3665] do_syscall_64+0x35/0xb0 [ 437.786424][ T3665] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 437.792609][ T3665] RIP: 0033:0x4665e9 09:03:03 executing program 5: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:03 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7}, 0x20) 09:03:03 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x200002a0) 09:03:03 executing program 5: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0}, 0x38) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x0, 0x80, 0x1a, 0xb0, 0x8, 0x40, 0x0, 0x4, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x2}, 0x4020, 0x6, 0x40, 0x6, 0x0, 0x1, 0x3, 0x0, 0x7fff, 0x0, 0xffffffffffffb54d}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000011c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001200)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}, 0x40000001) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000001340), 0x4) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000001300)={r0}, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r1}, 0x8) [ 437.796540][ T3665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 437.816577][ T3665] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 437.826694][ T3665] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 437.834683][ T3665] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 09:03:03 executing program 4: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x6000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:03 executing program 0: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 437.843104][ T3665] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 437.851176][ T3665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 437.859383][ T3665] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:04 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:03:04 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r0, 0x10, &(0x7f0000000340)={&(0x7f0000000280)=""/159, 0x9f, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x5, &(0x7f0000000100)=@raw=[@jmp={0x5, 0x1, 0x1, 0x6, 0x2, 0xffffffffffffffe0, 0x4}, @ldst={0x2, 0x3, 0x3, 0x3, 0xb, 0x1}, @alu={0x4, 0x0, 0x5, 0x0, 0x6, 0x4, 0xffffffffffffffff}, @map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000140)='GPL\x00', 0xf2f8, 0x55, &(0x7f0000000180)=""/85, 0x41000, 0xa, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x8, 0xa9, 0x200}, 0x10, r2}, 0x78) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x6) 09:03:04 executing program 1 (fault-call:0 fault-nth:10): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:04 executing program 4: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:04 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x7}, 0x20) 09:03:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x7000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 438.477551][ T3704] FAULT_INJECTION: forcing a failure. [ 438.477551][ T3704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 438.495462][ T3704] CPU: 0 PID: 3704 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 438.505757][ T3704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.516000][ T3704] Call Trace: [ 438.519587][ T3704] dump_stack_lvl+0xcd/0x134 09:03:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x8000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 438.524305][ T3704] should_fail.cold+0x5/0xa [ 438.529182][ T3704] _copy_to_user+0x2c/0x150 [ 438.533890][ T3704] bpf_verifier_vlog+0x1b2/0x2e0 [ 438.538853][ T3704] __btf_verifier_log+0xbb/0xf0 [ 438.543728][ T3704] ? btf_id_cmp_func+0x90/0x90 [ 438.548594][ T3704] ? lock_acquire+0x442/0x510 [ 438.553287][ T3704] ? rcu_read_lock_sched_held+0xd/0x70 [ 438.558859][ T3704] ? lock_release+0x522/0x720 [ 438.563551][ T3704] ? lock_release+0x522/0x720 [ 438.568248][ T3704] btf_parse_hdr+0x4d3/0xc00 [ 438.573044][ T3704] ? btf_datasec_log+0xa0/0xa0 [ 438.577879][ T3704] btf_new_fd+0x5ae/0x2450 [ 438.582325][ T3704] ? rcu_read_lock_sched_held+0xd/0x70 [ 438.587805][ T3704] ? lock_acquire+0x442/0x510 [ 438.592501][ T3704] ? rcu_read_lock_sched_held+0xd/0x70 [ 438.597990][ T3704] ? lock_release+0x522/0x720 [ 438.602901][ T3704] ? __might_fault+0xd3/0x180 [ 438.607782][ T3704] ? lock_downgrade+0x6e0/0x6e0 [ 438.612746][ T3704] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 438.619193][ T3704] ? btf_type_snprintf_show+0x140/0x140 09:03:04 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='memory.swap.max\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f00000001c0)=0xe0000000, 0x12) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x4, 0x80, 0x7, 0x81, 0x8, 0xdf, 0x0, 0x7fff, 0x4, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040)}, 0x8080, 0x401, 0x6, 0x6, 0xfffffffffffeffff, 0x0, 0x8000, 0x0, 0x38, 0x0, 0x3}) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0xfffffffffffffffe, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000140)=r2) [ 438.624760][ T3704] ? apparmor_capable+0x1d8/0x460 [ 438.629813][ T3704] ? security_capable+0x8f/0xc0 [ 438.634681][ T3704] __sys_bpf+0x1e4c/0x5410 [ 438.639109][ T3704] ? ksys_write+0x212/0x250 [ 438.643642][ T3704] ? bpf_link_get_from_fd+0x110/0x110 [ 438.649044][ T3704] ? rcu_read_lock_sched_held+0xd/0x70 [ 438.654692][ T3704] ? lock_release+0x522/0x720 [ 438.659480][ T3704] ? fsnotify+0x1050/0x1050 [ 438.664110][ T3704] ? ksys_write+0x12d/0x250 [ 438.668636][ T3704] ? rcu_read_lock_sched_held+0xd/0x70 [ 438.674120][ T3704] ? lock_acquire+0x442/0x510 [ 438.678814][ T3704] ? lock_release+0x522/0x720 [ 438.683599][ T3704] ? trace_hardirqs_on+0x38/0x1c0 [ 438.688727][ T3704] __x64_sys_bpf+0x75/0xb0 [ 438.693248][ T3704] ? syscall_enter_from_user_mode+0x21/0x70 [ 438.699252][ T3704] do_syscall_64+0x35/0xb0 [ 438.703687][ T3704] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 438.709598][ T3704] RIP: 0033:0x4665e9 09:03:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xa000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 438.713503][ T3704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 438.733997][ T3704] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 438.742536][ T3704] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 438.751259][ T3704] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 438.759247][ T3704] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 438.767230][ T3704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 09:03:04 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x200002a0) 09:03:04 executing program 4: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x7f, 0x7, 0x9, 0x800, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r0, 0x4) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r0, 0x4) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x200) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000001300)={&(0x7f0000000140)="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", &(0x7f0000001140)=""/178, &(0x7f0000001200)="72394c3ae2a80476fd928e1c9bbc3b9bf347fd73de5212ad0c6f4dab2efc9960d2ff3882c283dd777a3ed30ba10a1fab4c09bfab2b1dd1055ae0f95a44f48df2094a93f0a90081e552308a1ab803e34c0869f2068cf91eba1fc1b20b2c728995700c8507c702d04190", &(0x7f0000001280)="4989f4ab9b68e8301d7ccb8fe9b28986a026dd4e40e2638e48844e7a2642646136cae41e532d45af6903a120e9f9ed845c5040f55766f356e25796e5e96b38e0babb4a92e229b03b15edbb646a232f", 0x1, r0}, 0x38) [ 438.775217][ T3704] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:05 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x110, 0x110, 0x5, [@const={0x10, 0x0, 0x0, 0xa, 0x3}, @union={0x6, 0xa, 0x0, 0x5, 0x1, 0x7, [{0x5, 0x5, 0x1}, {0xb, 0x2, 0x8}, {0xd, 0x3, 0xafa7}, {0x4, 0x4, 0x4}, {0x10, 0x1, 0x9}, {0x0, 0x4, 0x1}, {0xb, 0x0, 0x4}, {0x8, 0x5, 0xfffffffd}, {0xe, 0x1, 0x80000000}, {0x10, 0x2, 0x5}]}, @restrict={0x10}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xd, 0x5}, {0x2, 0x4}, {0x4, 0x3}, {0xc, 0x2}, {0x7, 0x5}, {0xe}, {0x2, 0x1}, {0xa, 0x3}, {0x10, 0x3}, {0x10, 0x2}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x4, 0x5}}]}, {0x0, [0x0, 0x5f, 0x0]}}, &(0x7f00000000c0)=""/197, 0x12d, 0xc5}, 0x20) 09:03:05 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:03:05 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xc000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:05 executing program 1 (fault-call:0 fault-nth:11): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:05 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000004a40)={0x0, 0x0, 0x16, 0xfffffffffffffee6, 0x41}, 0x785274f9) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000180)={&(0x7f00000002c0)="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", &(0x7f00000022c0)=""/179, &(0x7f00000000c0)="522c8ea3a63825752e87aecb140fb4d58462c24f2f7875356cf8536301ee4b843d01677eef64b01ac9cf0853597da6ee217392b774194743fa8925417bd5d039ef80c3c3a5e0e1e353b4b185e09f1ff8f9962f23f61c612dc2c1b5060b088bc23cb5c4623d418a4909f6c12111a06668c8d3a38820f92a88c64f69775fb518f0104403e67ac36f9c0caa7470ec6acd3c59728d05b36cd3c1869b0b91", &(0x7f00000012c0)="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", 0x0, 0xffffffffffffffff, 0x4}, 0x38) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004840)=[{&(0x7f0000002680)=""/4096, 0x1000}, {&(0x7f0000003680)=""/156, 0x9c}, {&(0x7f0000000240)=""/84, 0x54}, {&(0x7f0000003740)=""/218, 0xda}, {&(0x7f0000003840)=""/4096, 0x1000}], 0x5, &(0x7f00000048c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'], 0x90}, 0x40000040) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000004a00)={&(0x7f00000049c0)='./file0\x00', r1}, 0x10) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000200)=0xffffffffffffffff, 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000004a80)={r3}, 0x8) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000004980)={&(0x7f0000002380)="0f627cab8aef69dfa5eddc7637deb47672603ae8e9c8e6b3478ad994eb6780ef34c45cd3e91bc7a4bc6fe5456b95bcbf330308bf2f28ec1a45a34e58fbce9484ee2810afd3fc5edbc248e9cea702acba900da0112f2fd9f9d4f99721dbdd335e85b4ad1fbfa36c66b4ec4170a08086d1e94b775b18940ca018880d3deccc3c0b34676285eaa23d1b2d89e858e04b197e3819b3a4ef5915ee02cc79664dd53dff0021c77e4bc711869030421252957a604d9d0d903f2181d9406c50968382421f7429e6b100353bb735dc6cec62d4c31570ac", &(0x7f0000000000)=""/120, &(0x7f0000002480)="0f978090cfbf6ac7cf4ab8b0072bc39ee10e610a7e7cf56ddc11bfb1be82893a4ee4df381d7e1325b56a5176bef3b0d6ad7ba639adcc321371280e0388ddd02080cdd8639372f774525c863528fb3637782db7dc69dcd652eebb215ef329a625276222936227d677bcf5de0f1c94020b8da5b4adbfd5a4992df4eeac946ae4d999b024ee5313dbdcd367b25947d8b40725aae973ffb6be6649e0026c07b4d6db46b4a34411fd09319346592bf40c9419a6c9145d5f7f2e938052be467fdb3770996724dfde0dca929d8f2cf537dadc763f31e4dbd6bb8c", &(0x7f0000002580)="ce4d69357281d1f28d2a7a4d8809b0ef1498c3a88df2d877a7cb8d10b297729f85132592b7350c47a926001cc0dc436caca1a7da53c7aa8af7cb949e6c3b72ede70024ba038ccef2fcd183e9441909380eeaa6a36ad15cbd4cd62d7ceccc72f905d00206a6897114a2ea4d34a44aba108fe70e8c65112bfaa4f816b0b4eadcf6678862d01b1a068a003ab33d2fc63b75edd0f8ab9e188baeca85d55fc56df36c24ef17dcb071dbc36d93547aa8b3fcaaa0799bfd498ac776275ccd08894e3d0e4f9c212d8bfc92fe", 0x80000000, r2, 0x4}, 0x38) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0), 0xc) [ 439.361547][ T3741] FAULT_INJECTION: forcing a failure. [ 439.361547][ T3741] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 439.385478][ T3741] CPU: 1 PID: 3741 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 439.395864][ T3741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.406140][ T3741] Call Trace: [ 439.409434][ T3741] dump_stack_lvl+0xcd/0x134 [ 439.414059][ T3741] should_fail.cold+0x5/0xa [ 439.418686][ T3741] _copy_to_user+0x2c/0x150 [ 439.423312][ T3741] bpf_verifier_vlog+0x1b2/0x2e0 [ 439.428456][ T3741] __btf_verifier_log+0xbb/0xf0 [ 439.433328][ T3741] ? btf_id_cmp_func+0x90/0x90 [ 439.438199][ T3741] ? lock_acquire+0x442/0x510 [ 439.442982][ T3741] ? rcu_read_lock_sched_held+0xd/0x70 [ 439.448504][ T3741] ? lock_release+0x522/0x720 [ 439.453980][ T3741] ? lock_release+0x522/0x720 09:03:05 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) [ 439.458674][ T3741] btf_parse_hdr+0x514/0xc00 [ 439.463713][ T3741] ? btf_datasec_log+0xa0/0xa0 [ 439.468508][ T3741] btf_new_fd+0x5ae/0x2450 [ 439.472945][ T3741] ? rcu_read_lock_sched_held+0xd/0x70 [ 439.478600][ T3741] ? lock_acquire+0x442/0x510 [ 439.483465][ T3741] ? rcu_read_lock_sched_held+0xd/0x70 [ 439.490948][ T3741] ? lock_release+0x522/0x720 [ 439.495649][ T3741] ? __might_fault+0xd3/0x180 [ 439.500645][ T3741] ? lock_downgrade+0x6e0/0x6e0 [ 439.505729][ T3741] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 09:03:05 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) [ 439.511997][ T3741] ? btf_type_snprintf_show+0x140/0x140 [ 439.517850][ T3741] ? apparmor_capable+0x1d8/0x460 [ 439.522991][ T3741] ? security_capable+0x8f/0xc0 [ 439.528259][ T3741] __sys_bpf+0x1e4c/0x5410 [ 439.532863][ T3741] ? ksys_write+0x212/0x250 [ 439.537755][ T3741] ? bpf_link_get_from_fd+0x110/0x110 [ 439.543143][ T3741] ? rcu_read_lock_sched_held+0xd/0x70 [ 439.548657][ T3741] ? lock_release+0x522/0x720 [ 439.553426][ T3741] ? fsnotify+0x1050/0x1050 [ 439.558147][ T3741] ? ksys_write+0x12d/0x250 [ 439.562953][ T3741] ? rcu_read_lock_sched_held+0xd/0x70 [ 439.568431][ T3741] ? lock_acquire+0x442/0x510 [ 439.573385][ T3741] ? lock_release+0x522/0x720 [ 439.578077][ T3741] ? trace_hardirqs_on+0x38/0x1c0 [ 439.583117][ T3741] __x64_sys_bpf+0x75/0xb0 [ 439.587543][ T3741] ? syscall_enter_from_user_mode+0x21/0x70 [ 439.593485][ T3741] do_syscall_64+0x35/0xb0 [ 439.597920][ T3741] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 439.603826][ T3741] RIP: 0033:0x4665e9 09:03:05 executing program 2: socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) [ 439.607730][ T3741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 439.627785][ T3741] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 439.636306][ T3741] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 439.644378][ T3741] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 439.652458][ T3741] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 439.660660][ T3741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 439.668732][ T3741] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 [ 439.699120][ T3264] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.705461][ T3264] ieee802154 phy1 wpan1: encryption failed: -22 09:03:05 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/77, 0x4d}, {&(0x7f00000000c0)=""/179, 0xb3}], 0x2, &(0x7f00000001c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}, 0x40012141) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x1, 0x1, 0x0, r1}]}, &(0x7f0000000340)='syzkaller\x00', 0x7fff, 0x93, &(0x7f0000000380)=""/147, 0x41100, 0x1, '\x00', 0x0, 0x18, r0, 0x8, &(0x7f0000000440)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x5, 0xd, 0x0, 0x21d58135}, 0x10, 0x1c701}, 0x78) 09:03:05 executing program 4: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xe000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:05 executing program 5: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x10, &(0x7f0000000340)={&(0x7f0000000240)=""/239, 0xef, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x9, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, [@map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x38}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x4}, @generic={0x8, 0xd, 0x2, 0x4, 0xffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}]}, &(0x7f00000000c0)='GPL\x00', 0xfffff1c6, 0x20, &(0x7f0000000100)=""/32, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x7, 0x0, 0x3}, 0x10, r0}, 0x78) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:05 executing program 2: socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:03:05 executing program 1 (fault-call:0 fault-nth:12): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:05 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000000)="7ebb615c22ccf9dc5c4040943cd67810acfbf107e225ea213445a332c0c498761bbd76e385923f8c6faa958e34efe519f0b1921a24dc4f5d006a4c6f4df274a117b28d79cd0e35f3f5cc6991eeff179a85ff50ac501ee21a23a767b60273932a5c9718c93a3573dded192f26f54f705072e306e5ef798001ccb7af9cd324a93b3691ed510a3047708038a042ec14a7f67d4077f67ec83ae68bb22bb4497607647feba7619689da7a44b30f091da18d08041046b769ed8a87117bc4fff5d342ded7a5b11ae70e4d9aa9b41a4f69cd3258e38a61227afbe055fe0b161b17887485409648f5", &(0x7f0000000100)=""/209, 0x4}, 0x20) 09:03:05 executing program 4: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x10000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:05 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004f80)={&(0x7f00000047c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000004e80)=[{&(0x7f0000004840)=""/214, 0xd6}, {&(0x7f0000004940)=""/230, 0xe6}, {&(0x7f0000004a40)=""/161, 0xa1}, {&(0x7f0000004b00)=""/97, 0x61}, {&(0x7f0000004b80)}, {&(0x7f0000004bc0)=""/162, 0xa2}, {&(0x7f0000004c80)=""/248, 0xf8}, {&(0x7f0000004d80)=""/204, 0xcc}], 0x8, &(0x7f0000004f00)=""/95, 0x5f}, 0x40002143) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000004fc0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005080)={0x11, 0x6, &(0x7f0000000000)=@raw=[@map={0x18, 0x9, 0x1, 0x0, 0x1}, @ldst={0x1, 0x3, 0x3, 0x0, 0xb, 0x1, 0x8}, @call={0x85, 0x0, 0x0, 0x8c}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}], &(0x7f0000000040)='GPL\x00', 0x70e, 0x52, &(0x7f0000000080)=""/82, 0x41100, 0x3, '\x00', r0, 0x0, r1, 0x8, &(0x7f0000005000)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000005040)={0x1, 0x1, 0x9, 0xfff}, 0x10}, 0x78) 09:03:05 executing program 2: socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/90, 0x5a}], 0x4, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) [ 439.885301][ T3771] FAULT_INJECTION: forcing a failure. [ 439.885301][ T3771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 439.936913][ T3771] CPU: 0 PID: 3771 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 439.947675][ T3771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.958195][ T3771] Call Trace: [ 439.961755][ T3771] dump_stack_lvl+0xcd/0x134 [ 439.966584][ T3771] should_fail.cold+0x5/0xa [ 439.972070][ T3771] _copy_to_user+0x2c/0x150 [ 439.977032][ T3771] bpf_verifier_vlog+0x1b2/0x2e0 [ 439.981992][ T3771] __btf_verifier_log+0xbb/0xf0 09:03:06 executing program 4: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x3f000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 439.986904][ T3771] ? btf_id_cmp_func+0x90/0x90 [ 439.992139][ T3771] ? lock_acquire+0x442/0x510 [ 439.996922][ T3771] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.002514][ T3771] ? lock_release+0x522/0x720 [ 440.007212][ T3771] ? lock_release+0x522/0x720 [ 440.011913][ T3771] btf_parse_hdr+0x555/0xc00 [ 440.016920][ T3771] ? btf_datasec_log+0xa0/0xa0 [ 440.021899][ T3771] btf_new_fd+0x5ae/0x2450 [ 440.026564][ T3771] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.032490][ T3771] ? lock_acquire+0x442/0x510 [ 440.037327][ T3771] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.042856][ T3771] ? lock_release+0x522/0x720 [ 440.047916][ T3771] ? __might_fault+0xd3/0x180 [ 440.052796][ T3771] ? lock_downgrade+0x6e0/0x6e0 [ 440.057666][ T3771] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 440.064190][ T3771] ? btf_type_snprintf_show+0x140/0x140 [ 440.069767][ T3771] ? apparmor_capable+0x1d8/0x460 [ 440.074819][ T3771] ? security_capable+0x8f/0xc0 [ 440.079785][ T3771] __sys_bpf+0x1e4c/0x5410 09:03:06 executing program 4: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x48000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 440.084227][ T3771] ? ksys_write+0x212/0x250 [ 440.088934][ T3771] ? bpf_link_get_from_fd+0x110/0x110 [ 440.094453][ T3771] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.100201][ T3771] ? lock_release+0x522/0x720 [ 440.104891][ T3771] ? fsnotify+0x1050/0x1050 [ 440.109419][ T3771] ? ksys_write+0x12d/0x250 [ 440.113951][ T3771] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.119986][ T3771] ? lock_acquire+0x442/0x510 [ 440.124684][ T3771] ? lock_release+0x522/0x720 [ 440.129389][ T3771] ? trace_hardirqs_on+0x38/0x1c0 [ 440.134610][ T3771] __x64_sys_bpf+0x75/0xb0 [ 440.139137][ T3771] ? syscall_enter_from_user_mode+0x21/0x70 [ 440.145238][ T3771] do_syscall_64+0x35/0xb0 [ 440.149861][ T3771] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 440.155784][ T3771] RIP: 0033:0x4665e9 [ 440.159686][ T3771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:03:06 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x4c000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 440.179983][ T3771] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 440.189301][ T3771] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 440.197408][ T3771] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 440.205563][ T3771] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 440.214306][ T3771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 440.222456][ T3771] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:06 executing program 1 (fault-call:0 fault-nth:13): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 0: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000080)={&(0x7f0000000040)=""/14, 0xe}}, 0x10) 09:03:06 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x6, 0x1, 0x1f, 0x2, 0x1, 0xfff, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x4}, 0x40) 09:03:06 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, 0x0, 0x40000000) 09:03:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x63000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x68000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)=""/121) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:06 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, 0x0, 0x40000000) 09:03:06 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0xfffffea9}, 0x20) 09:03:06 executing program 4: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 440.469620][ T3815] FAULT_INJECTION: forcing a failure. [ 440.469620][ T3815] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 440.540759][ T3815] CPU: 1 PID: 3815 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 440.550982][ T3815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.561147][ T3815] Call Trace: [ 440.564450][ T3815] dump_stack_lvl+0xcd/0x134 [ 440.569162][ T3815] should_fail.cold+0x5/0xa [ 440.573698][ T3815] _copy_to_user+0x2c/0x150 [ 440.578226][ T3815] bpf_verifier_vlog+0x1b2/0x2e0 [ 440.583185][ T3815] __btf_verifier_log+0xbb/0xf0 09:03:06 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, 0x0, 0x40000000) [ 440.588145][ T3815] ? btf_id_cmp_func+0x90/0x90 [ 440.593104][ T3815] ? kvmalloc_node+0x61/0xf0 [ 440.597810][ T3815] ? lock_acquire+0x442/0x510 [ 440.602509][ T3815] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.608259][ T3815] ? lock_release+0x522/0x720 [ 440.612951][ T3815] ? lock_release+0x522/0x720 [ 440.617664][ T3815] btf_parse_hdr+0x566/0xc00 [ 440.622802][ T3815] ? btf_datasec_log+0xa0/0xa0 [ 440.627857][ T3815] btf_new_fd+0x5ae/0x2450 [ 440.632469][ T3815] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.638142][ T3815] ? lock_acquire+0x442/0x510 [ 440.642843][ T3815] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.648370][ T3815] ? lock_release+0x522/0x720 [ 440.653067][ T3815] ? __might_fault+0xd3/0x180 [ 440.657772][ T3815] ? lock_downgrade+0x6e0/0x6e0 [ 440.662731][ T3815] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 440.669038][ T3815] ? btf_type_snprintf_show+0x140/0x140 [ 440.674692][ T3815] ? apparmor_capable+0x1d8/0x460 [ 440.679929][ T3815] ? security_capable+0x8f/0xc0 [ 440.684978][ T3815] __sys_bpf+0x1e4c/0x5410 [ 440.689948][ T3815] ? ksys_write+0x212/0x250 [ 440.694823][ T3815] ? bpf_link_get_from_fd+0x110/0x110 [ 440.700336][ T3815] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.705821][ T3815] ? lock_release+0x522/0x720 [ 440.710511][ T3815] ? fsnotify+0x1050/0x1050 [ 440.716121][ T3815] ? ksys_write+0x12d/0x250 [ 440.720910][ T3815] ? rcu_read_lock_sched_held+0xd/0x70 [ 440.726390][ T3815] ? lock_acquire+0x442/0x510 [ 440.731105][ T3815] ? lock_release+0x522/0x720 [ 440.735800][ T3815] ? trace_hardirqs_on+0x38/0x1c0 [ 440.741276][ T3815] __x64_sys_bpf+0x75/0xb0 [ 440.745709][ T3815] ? syscall_enter_from_user_mode+0x21/0x70 [ 440.751886][ T3815] do_syscall_64+0x35/0xb0 [ 440.756311][ T3815] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 440.762231][ T3815] RIP: 0033:0x4665e9 [ 440.766145][ T3815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 440.785958][ T3815] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 440.794471][ T3815] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 440.802458][ T3815] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 440.810438][ T3815] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 440.818771][ T3815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 440.826794][ T3815] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:06 executing program 1 (fault-call:0 fault-nth:14): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffffffffffffff48, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x10c6) 09:03:06 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/106, 0x6a}, 0x40000000) 09:03:06 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x10040000000) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x9, &(0x7f0000000040)=@raw=[@jmp={0x5, 0x1, 0x5, 0x6, 0x1, 0x18, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x3e}, @alu={0x7, 0x1, 0xa, 0xe, 0x0, 0xfffffffffffffffe, 0x4}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}, @exit, @generic={0x20, 0x2, 0x1, 0xfff8, 0x4}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x8, 0x65, &(0x7f0000000100)=""/101, 0xa1cc55389c591400, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0xa, 0x5, 0x8}, 0x10}, 0x78) 09:03:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x6c000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:06 executing program 4: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:07 executing program 4: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 441.008209][ T3847] FAULT_INJECTION: forcing a failure. [ 441.008209][ T3847] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 441.042319][ T3847] CPU: 1 PID: 3847 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 09:03:07 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180)={r0}, 0x1b) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffff76, 0x0, 0x1}, 0x20) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000), 0x4) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={0xffffffffffffffff}, 0x4) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000240)='syzkaller\x00', 0x40, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000280)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0x10, 0x3, 0xf301}, 0x10}, 0x78) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000380)={r2, r3, 0x4, r4}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) [ 441.052713][ T3847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.062893][ T3847] Call Trace: [ 441.066186][ T3847] dump_stack_lvl+0xcd/0x134 [ 441.071197][ T3847] should_fail.cold+0x5/0xa [ 441.075714][ T3847] _copy_to_user+0x2c/0x150 [ 441.080216][ T3847] bpf_verifier_vlog+0x1b2/0x2e0 [ 441.085159][ T3847] __btf_verifier_log+0xbb/0xf0 [ 441.090091][ T3847] ? btf_id_cmp_func+0x90/0x90 [ 441.094941][ T3847] __btf_verifier_log_type+0x771/0x8e0 [ 441.100405][ T3847] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 441.106786][ T3847] ? btf_var_show+0x380/0x380 [ 441.111546][ T3847] ? btf_id_cmp_func+0x90/0x90 [ 441.117029][ T3847] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 441.123267][ T3847] ? do_swap+0x132/0x210 [ 441.127521][ T3847] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 441.133773][ T3847] ? env_stack_push+0x390/0x390 [ 441.138740][ T3847] btf_func_proto_check_meta+0xd6/0x160 [ 441.144315][ T3847] btf_check_all_metas+0x3a6/0xa40 [ 441.149439][ T3847] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 441.156285][ T3847] ? btf_parse_str_sec+0x1e8/0x2e0 [ 441.161399][ T3847] btf_new_fd+0x976/0x2450 [ 441.165910][ T3847] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.171376][ T3847] ? lock_acquire+0x442/0x510 [ 441.176404][ T3847] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.181861][ T3847] ? lock_release+0x522/0x720 [ 441.186531][ T3847] ? __might_fault+0xd3/0x180 [ 441.191202][ T3847] ? lock_downgrade+0x6e0/0x6e0 [ 441.196219][ T3847] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 441.202468][ T3847] ? btf_type_snprintf_show+0x140/0x140 [ 441.208364][ T3847] ? apparmor_capable+0x1d8/0x460 [ 441.213404][ T3847] ? security_capable+0x8f/0xc0 [ 441.218254][ T3847] __sys_bpf+0x1e4c/0x5410 [ 441.222957][ T3847] ? ksys_write+0x212/0x250 [ 441.227461][ T3847] ? bpf_link_get_from_fd+0x110/0x110 [ 441.232851][ T3847] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.238499][ T3847] ? lock_release+0x522/0x720 [ 441.243362][ T3847] ? fsnotify+0x1050/0x1050 [ 441.248381][ T3847] ? ksys_write+0x12d/0x250 [ 441.252887][ T3847] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.258538][ T3847] ? lock_acquire+0x442/0x510 [ 441.263296][ T3847] ? lock_release+0x522/0x720 [ 441.268203][ T3847] ? trace_hardirqs_on+0x38/0x1c0 [ 441.273226][ T3847] __x64_sys_bpf+0x75/0xb0 [ 441.278793][ T3847] ? syscall_enter_from_user_mode+0x21/0x70 [ 441.284718][ T3847] do_syscall_64+0x35/0xb0 [ 441.289147][ T3847] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 441.295140][ T3847] RIP: 0033:0x4665e9 [ 441.299574][ T3847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 441.319268][ T3847] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 441.327695][ T3847] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 441.336096][ T3847] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 441.344166][ T3847] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 09:03:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x74000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:07 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x12, 0x1, 0x1, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x4) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000100)=r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x3, [@fwd={0x10}, @enum={0x5, 0x6, 0x0, 0x6, 0x4, [{0x6, 0xfffffffe}, {0x7, 0xfff}, {0xe, 0x91}, {0xc, 0x7fffffff}, {0x7, 0x8}, {0xa, 0x7}]}]}, {0x0, [0x0]}}, &(0x7f00000001c0)=""/53, 0x63, 0x35}, 0x20) [ 441.352137][ T3847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 441.360796][ T3847] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:07 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xffffff9a, 0x1}, 0x5e) 09:03:07 executing program 4: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:07 executing program 1 (fault-call:0 fault-nth:15): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:07 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={&(0x7f0000000000)=""/132, 0x84, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=r1, 0x4) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 441.592051][ T3867] FAULT_INJECTION: forcing a failure. [ 441.592051][ T3867] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 441.620262][ T3867] CPU: 1 PID: 3867 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 441.630588][ T3867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.641622][ T3867] Call Trace: [ 441.645010][ T3867] dump_stack_lvl+0xcd/0x134 [ 441.649626][ T3867] should_fail.cold+0x5/0xa [ 441.654152][ T3867] _copy_to_user+0x2c/0x150 [ 441.658692][ T3867] bpf_verifier_vlog+0x1b2/0x2e0 [ 441.663739][ T3867] btf_verifier_log+0x1c8/0x270 [ 441.668607][ T3867] ? btf_free_rcu+0xd0/0xd0 [ 441.673131][ T3867] ? __btf_verifier_log+0xbb/0xf0 [ 441.678275][ T3867] ? btf_id_cmp_func+0x90/0x90 [ 441.683070][ T3867] btf_func_proto_log+0x8e/0x870 [ 441.688206][ T3867] __btf_verifier_log_type+0x4f3/0x8e0 [ 441.693683][ T3867] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 441.699957][ T3867] ? btf_var_show+0x380/0x380 [ 441.704656][ T3867] ? btf_id_cmp_func+0x90/0x90 [ 441.709455][ T3867] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 441.715714][ T3867] ? do_swap+0x132/0x210 [ 441.719960][ T3867] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 441.726201][ T3867] ? env_stack_push+0x390/0x390 [ 441.731221][ T3867] btf_func_proto_check_meta+0xd6/0x160 [ 441.736948][ T3867] btf_check_all_metas+0x3a6/0xa40 [ 441.742075][ T3867] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 441.748317][ T3867] ? btf_parse_str_sec+0x1e8/0x2e0 [ 441.753667][ T3867] btf_new_fd+0x976/0x2450 [ 441.758200][ T3867] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.763949][ T3867] ? lock_acquire+0x442/0x510 [ 441.768728][ T3867] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.774187][ T3867] ? lock_release+0x522/0x720 [ 441.778872][ T3867] ? __might_fault+0xd3/0x180 [ 441.783681][ T3867] ? lock_downgrade+0x6e0/0x6e0 [ 441.788971][ T3867] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 441.795324][ T3867] ? btf_type_snprintf_show+0x140/0x140 [ 441.801059][ T3867] ? apparmor_capable+0x1d8/0x460 [ 441.806097][ T3867] ? security_capable+0x8f/0xc0 [ 441.810945][ T3867] __sys_bpf+0x1e4c/0x5410 [ 441.815358][ T3867] ? ksys_write+0x212/0x250 [ 441.819881][ T3867] ? bpf_link_get_from_fd+0x110/0x110 [ 441.825255][ T3867] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.830798][ T3867] ? lock_release+0x522/0x720 [ 441.835662][ T3867] ? fsnotify+0x1050/0x1050 [ 441.840532][ T3867] ? ksys_write+0x12d/0x250 [ 441.845138][ T3867] ? rcu_read_lock_sched_held+0xd/0x70 [ 441.850863][ T3867] ? lock_acquire+0x442/0x510 [ 441.855730][ T3867] ? lock_release+0x522/0x720 [ 441.860414][ T3867] ? trace_hardirqs_on+0x38/0x1c0 [ 441.865461][ T3867] __x64_sys_bpf+0x75/0xb0 [ 441.869876][ T3867] ? syscall_enter_from_user_mode+0x21/0x70 [ 441.875772][ T3867] do_syscall_64+0x35/0xb0 [ 441.880283][ T3867] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 441.886446][ T3867] RIP: 0033:0x4665e9 [ 441.890355][ T3867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 441.910282][ T3867] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 441.918774][ T3867] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 441.926745][ T3867] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 441.934774][ T3867] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 09:03:08 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40000000) 09:03:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x7a000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:08 executing program 4: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:08 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x20) [ 441.942922][ T3867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 441.950883][ T3867] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:08 executing program 1 (fault-call:0 fault-nth:16): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:08 executing program 4: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:08 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1b, 0x3f, 0x3, 0x7f, 0x134b, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x5}, 0x40) recvmsg$unix(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000700)=""/179, 0xb3}, {&(0x7f00000007c0)=""/48, 0x30}, {&(0x7f0000000800)=""/169, 0xa9}, {&(0x7f00000008c0)=""/129, 0x81}], 0x4, &(0x7f00000009c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x40}, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000bc0)=0xffffffffffffffff, 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000c80)={0x7, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000cc0)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffff8}, [@alu={0x7, 0x0, 0x4, 0x2, 0xa, 0xffffffffffffffe0, 0xffffffffffffffff}, @map={0x18, 0x8, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000a80)='GPL\x00', 0x6, 0xcd, &(0x7f0000000ac0)=""/205, 0x41000, 0x10, '\x00', 0x0, 0x1b, r6, 0x8, &(0x7f0000000c00)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000c40)={0x0, 0xd, 0x2ea0, 0xff}, 0x10, r7}, 0x78) recvmsg$kcm(r5, &(0x7f0000006740)={&(0x7f0000006480)=@can={0x1d, 0x0}, 0x80, &(0x7f0000006640)=[{&(0x7f0000006500)=""/78, 0x4e}, {&(0x7f0000006580)=""/153, 0x99}], 0x2, &(0x7f0000006680)=""/159, 0x9f}, 0x40000001) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000006780), 0x4) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000006a40)=@bpf_ext={0x1c, 0x8, &(0x7f0000006840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0xeb2}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x1, 0x4, 0x2, 0x6, 0x50}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6a}]}, &(0x7f0000006880)='syzkaller\x00', 0x0, 0xe3, &(0x7f00000068c0)=""/227, 0x41000, 0x15, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000069c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000006a00)={0x2, 0x9, 0x10000, 0x2}, 0x10, 0x27ccc, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000006ac0)={0x1, 0x9, &(0x7f0000001fc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfff}, [@ldst={0x1, 0x3, 0x0, 0xb, 0x7, 0xfffffffffffffffc, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0xff}, @jmp={0x5, 0x1, 0x3, 0xb, 0xf, 0x20}, @jmp={0x5, 0x1, 0x0, 0x7, 0x1, 0xffffffffffffffff, 0x1}]}, &(0x7f0000002040)='syzkaller\x00', 0x7fffffff, 0x0, 0x0, 0x41100, 0x4, '\x00', r8, 0x9, r9, 0x8, &(0x7f00000067c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000006800)={0x2, 0x0, 0x5, 0x2}, 0x10, r7, r10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f40)={0xffffffffffffffff, 0x0, 0x44, 0x1000, &(0x7f0000000d40)="9635560fb2b30f8c78acca73d8a1376a8069e22945aedd187aa9bc65e70a9302649da1df278e89183ce5df5397348cb12610bb08eb3342e772c0509bb1b18f6fab0153a5", &(0x7f0000000dc0)=""/4096, 0x3, 0x0, 0x51, 0xeb, &(0x7f0000001dc0)="8e0332bdcb5f82d02173bc640d491c71ffe761a5ed65e9f1dfd3f6eff2081b2c43f52ac379b79c5e0882641a40008c139b583152dcfc53984576570b6175d12dfe3ea5e61487c2eb5456678daa0cd0126e", &(0x7f0000001e40)="6cb630bb8ddaf3ec2b2440e8ee70048fbd093d2baee1ea4be533f912e25f9028ec3c84e8889219618f44d2d5c26663bfa085e4009657de058243fb243424aa174e3ee040567b9f5dd1e76c22e06551593464c3e3d55b24f01981a1946ee102feeecd3d2c73a5b514caeb8bcfc3feea19556525c7fbc6b33a743abe72df9f4b95c19f3cd0935f433a47aff701e726549c5f9f5bfe67e26c36b5652790664656f0a1c26a85d1f77e8c3f41eef2f90e2f9e26f57cb2dc1a37abc93507e0b211d6770dd344b353aff14285e7c51c9374be28c0093bc7cb0949dc78c7995428dbdf7dfe6e66d7854b9e8762089f", 0x1, 0x2}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_ext={0x1c, 0xf, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, [@map={0x18, 0x1}, @map={0x18, 0x5, 0x1, 0x0, 0x1}, @jmp={0x5, 0x0, 0x4, 0x9, 0x0, 0x50, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0xd551, 0x0, 0x0, 0x0, 0x1}, @map={0x18, 0x4, 0x1, 0x0, r1}, @jmp={0x5, 0x0, 0x7, 0x7, 0x8, 0xfffffffffffffff4}, @exit, @alu={0x7, 0x1, 0x2, 0x0, 0xea7d0cd69b69848, 0xfffffffffffffffc, 0xfffffffffffffffc}]}, &(0x7f0000000240)='syzkaller\x00', 0x97, 0xcd, &(0x7f00000002c0)=""/205, 0x40f00, 0x20, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000003c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0xf, 0x4}, 0x10, 0x15458}, 0x78) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000100)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@generic={0x8, 0x3, 0x4, 0x8, 0x3f}], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000080)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x7, 0x5, 0x80}, 0x10, 0xffffffffffffffff}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1, 0x1, &(0x7f00000004c0)=@raw=[@generic={0x7, 0x3, 0x6, 0xff00, 0x3}], &(0x7f0000000500)='GPL\x00', 0x88c3, 0x8a, &(0x7f0000000540)=""/138, 0x41000, 0x10, '\x00', 0x0, 0x8, r0, 0x8, &(0x7f0000000600)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000640)={0x4, 0x2, 0xc07c, 0x18ad}, 0x10, 0x0, r11}, 0x78) 09:03:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xb1000000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:08 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=0x1, 0x4) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x20) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r0, 0x4) [ 442.135307][ T3882] FAULT_INJECTION: forcing a failure. [ 442.135307][ T3882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 442.173104][ T3882] CPU: 1 PID: 3882 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 442.183206][ T3882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.193451][ T3882] Call Trace: [ 442.196841][ T3882] dump_stack_lvl+0xcd/0x134 [ 442.201461][ T3882] should_fail.cold+0x5/0xa [ 442.206086][ T3882] _copy_to_user+0x2c/0x150 [ 442.210724][ T3882] bpf_verifier_vlog+0x1b2/0x2e0 [ 442.215710][ T3882] btf_verifier_log+0x1c8/0x270 [ 442.220848][ T3882] ? btf_free_rcu+0xd0/0xd0 [ 442.225369][ T3882] ? __btf_verifier_log+0xbb/0xf0 [ 442.230411][ T3882] ? btf_id_cmp_func+0x90/0x90 [ 442.235233][ T3882] btf_func_proto_log+0x734/0x870 [ 442.240281][ T3882] __btf_verifier_log_type+0x4f3/0x8e0 [ 442.245971][ T3882] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 442.252313][ T3882] ? btf_var_show+0x380/0x380 [ 442.257007][ T3882] ? btf_id_cmp_func+0x90/0x90 [ 442.261793][ T3882] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 442.268051][ T3882] ? do_swap+0x132/0x210 [ 442.272313][ T3882] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 442.278928][ T3882] ? env_stack_push+0x390/0x390 09:03:08 executing program 0: sendmsg$sock(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="1b6e0f11c5d67a8eea0caf8250a8d8df9a05300aa06e08084a3327adc77480a4752f3a03ec9b9f97d2fed2f5875322f4814ab52646353dfd9e", 0x39}], 0x1, &(0x7f0000000080)}, 0x8e5a48c1a058dca3) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000080), 0x2, 0x0) 09:03:08 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x15, 0xffffffff}, 0x20) [ 442.283799][ T3882] btf_func_proto_check_meta+0xd6/0x160 [ 442.289368][ T3882] btf_check_all_metas+0x3a6/0xa40 [ 442.294599][ T3882] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 442.301129][ T3882] ? btf_parse_str_sec+0x1e8/0x2e0 [ 442.306369][ T3882] btf_new_fd+0x976/0x2450 [ 442.311847][ T3882] ? rcu_read_lock_sched_held+0xd/0x70 [ 442.317415][ T3882] ? lock_acquire+0x442/0x510 [ 442.322104][ T3882] ? rcu_read_lock_sched_held+0xd/0x70 [ 442.327586][ T3882] ? lock_release+0x522/0x720 [ 442.332288][ T3882] ? __might_fault+0xd3/0x180 [ 442.336981][ T3882] ? lock_downgrade+0x6e0/0x6e0 [ 442.342537][ T3882] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 442.348988][ T3882] ? btf_type_snprintf_show+0x140/0x140 [ 442.354561][ T3882] ? apparmor_capable+0x1d8/0x460 [ 442.359619][ T3882] ? security_capable+0x8f/0xc0 [ 442.364871][ T3882] __sys_bpf+0x1e4c/0x5410 [ 442.369486][ T3882] ? ksys_write+0x212/0x250 [ 442.374015][ T3882] ? bpf_link_get_from_fd+0x110/0x110 [ 442.379402][ T3882] ? rcu_read_lock_sched_held+0xd/0x70 [ 442.384976][ T3882] ? lock_release+0x522/0x720 [ 442.389668][ T3882] ? fsnotify+0x1050/0x1050 [ 442.394271][ T3882] ? ksys_write+0x12d/0x250 [ 442.398793][ T3882] ? rcu_read_lock_sched_held+0xd/0x70 [ 442.404274][ T3882] ? lock_acquire+0x442/0x510 [ 442.408988][ T3882] ? lock_release+0x522/0x720 [ 442.413686][ T3882] ? trace_hardirqs_on+0x38/0x1c0 [ 442.418736][ T3882] __x64_sys_bpf+0x75/0xb0 [ 442.423168][ T3882] ? syscall_enter_from_user_mode+0x21/0x70 [ 442.429084][ T3882] do_syscall_64+0x35/0xb0 [ 442.433518][ T3882] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 442.439559][ T3882] RIP: 0033:0x4665e9 [ 442.443495][ T3882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 442.463981][ T3882] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 442.472435][ T3882] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 09:03:08 executing program 4: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 442.480592][ T3882] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 442.489112][ T3882] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 442.497454][ T3882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 442.505437][ T3882] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:08 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 09:03:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xe4ffffff}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:08 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/50, 0x32}, {&(0x7f00000000c0)=""/156, 0x9c}, {&(0x7f0000000180)=""/244, 0xf4}], 0x3, &(0x7f0000000300)=""/87, 0x57}, 0x2) 09:03:08 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) 09:03:08 executing program 4: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:08 executing program 1 (fault-call:0 fault-nth:17): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 442.912815][ T3920] FAULT_INJECTION: forcing a failure. [ 442.912815][ T3920] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 442.972675][ T3920] CPU: 0 PID: 3920 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 442.982808][ T3920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.993084][ T3920] Call Trace: [ 442.996574][ T3920] dump_stack_lvl+0xcd/0x134 [ 443.001433][ T3920] should_fail.cold+0x5/0xa [ 443.006139][ T3920] _copy_to_user+0x2c/0x150 [ 443.010868][ T3920] bpf_verifier_vlog+0x1b2/0x2e0 [ 443.015930][ T3920] btf_verifier_log+0x1c8/0x270 [ 443.020907][ T3920] ? btf_free_rcu+0xd0/0xd0 [ 443.025434][ T3920] ? btf_func_proto_log+0x6c9/0x870 [ 443.030659][ T3920] __btf_verifier_log_type+0x4f3/0x8e0 [ 443.036139][ T3920] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 443.043187][ T3920] ? btf_var_show+0x380/0x380 [ 443.047885][ T3920] ? btf_id_cmp_func+0x90/0x90 [ 443.052678][ T3920] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 443.058944][ T3920] ? do_swap+0x132/0x210 [ 443.063730][ T3920] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 443.070471][ T3920] ? env_stack_push+0x390/0x390 [ 443.075956][ T3920] btf_func_proto_check_meta+0xd6/0x160 [ 443.081622][ T3920] btf_check_all_metas+0x3a6/0xa40 [ 443.086901][ T3920] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 443.093165][ T3920] ? btf_parse_str_sec+0x1e8/0x2e0 [ 443.098388][ T3920] btf_new_fd+0x976/0x2450 [ 443.102824][ T3920] ? rcu_read_lock_sched_held+0xd/0x70 [ 443.108402][ T3920] ? lock_acquire+0x442/0x510 [ 443.113118][ T3920] ? rcu_read_lock_sched_held+0xd/0x70 [ 443.118666][ T3920] ? lock_release+0x522/0x720 [ 443.123362][ T3920] ? __might_fault+0xd3/0x180 [ 443.128060][ T3920] ? lock_downgrade+0x6e0/0x6e0 [ 443.133095][ T3920] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 443.139353][ T3920] ? btf_type_snprintf_show+0x140/0x140 [ 443.144928][ T3920] ? apparmor_capable+0x1d8/0x460 [ 443.149976][ T3920] ? security_capable+0x8f/0xc0 [ 443.154852][ T3920] __sys_bpf+0x1e4c/0x5410 [ 443.159293][ T3920] ? ksys_write+0x212/0x250 [ 443.163820][ T3920] ? bpf_link_get_from_fd+0x110/0x110 [ 443.169296][ T3920] ? rcu_read_lock_sched_held+0xd/0x70 [ 443.174870][ T3920] ? lock_release+0x522/0x720 [ 443.179571][ T3920] ? fsnotify+0x1050/0x1050 [ 443.184092][ T3920] ? ksys_write+0x12d/0x250 [ 443.188637][ T3920] ? rcu_read_lock_sched_held+0xd/0x70 [ 443.194124][ T3920] ? lock_acquire+0x442/0x510 [ 443.198823][ T3920] ? lock_release+0x522/0x720 [ 443.203518][ T3920] ? trace_hardirqs_on+0x38/0x1c0 [ 443.208560][ T3920] __x64_sys_bpf+0x75/0xb0 [ 443.212991][ T3920] ? syscall_enter_from_user_mode+0x21/0x70 [ 443.218906][ T3920] do_syscall_64+0x35/0xb0 [ 443.223350][ T3920] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 443.229257][ T3920] RIP: 0033:0x4665e9 [ 443.233189][ T3920] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 443.252903][ T3920] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 443.261425][ T3920] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 09:03:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xffff0f00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 4: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'caif0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0xffffffff}, @fwd={0xd}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x11d, 0x87, 0x1}, 0x20) [ 443.270972][ T3920] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 443.278982][ T3920] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 443.286969][ T3920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 443.294950][ T3920] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:09 executing program 4: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xffff8000}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 4: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x1ff) 09:03:09 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = socket$kcm(0x29, 0xd65acf4a3fe76077, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000001740)) 09:03:09 executing program 1 (fault-call:0 fault-nth:18): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xffffff00}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'caif0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0xffffffff}, @fwd={0xd}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x11d, 0x87, 0x1}, 0x20) 09:03:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0xffffffe4}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:09 executing program 4: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 443.871204][ T3967] FAULT_INJECTION: forcing a failure. [ 443.871204][ T3967] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 443.920982][ T3967] CPU: 0 PID: 3967 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 443.931102][ T3967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.941271][ T3967] Call Trace: [ 443.944846][ T3967] dump_stack_lvl+0xcd/0x134 [ 443.949732][ T3967] should_fail.cold+0x5/0xa [ 443.954431][ T3967] _copy_to_user+0x2c/0x150 [ 443.958966][ T3967] bpf_verifier_vlog+0x1b2/0x2e0 [ 443.964013][ T3967] __btf_verifier_log+0xbb/0xf0 [ 443.969026][ T3967] ? btf_id_cmp_func+0x90/0x90 [ 443.973930][ T3967] ? btf_func_proto_log+0x6c9/0x870 [ 443.979157][ T3967] __btf_verifier_log_type+0x55d/0x8e0 [ 443.984999][ T3967] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 443.991529][ T3967] ? btf_var_show+0x380/0x380 [ 443.996227][ T3967] ? btf_id_cmp_func+0x90/0x90 [ 444.001237][ T3967] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 444.007608][ T3967] ? do_swap+0x132/0x210 [ 444.011869][ T3967] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 444.018225][ T3967] ? env_stack_push+0x390/0x390 [ 444.023186][ T3967] btf_func_proto_check_meta+0xd6/0x160 [ 444.028837][ T3967] btf_check_all_metas+0x3a6/0xa40 [ 444.034060][ T3967] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 444.040329][ T3967] ? btf_parse_str_sec+0x1e8/0x2e0 [ 444.045732][ T3967] btf_new_fd+0x976/0x2450 [ 444.050937][ T3967] ? rcu_read_lock_sched_held+0xd/0x70 [ 444.056433][ T3967] ? lock_acquire+0x442/0x510 [ 444.061366][ T3967] ? rcu_read_lock_sched_held+0xd/0x70 09:03:09 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'caif0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0xffffffff}, @fwd={0xd}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x11d, 0x87, 0x1}, 0x20) 09:03:09 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:10 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000002c0)={'caif0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0xffffffff}, @fwd={0xd}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x11d, 0x87, 0x1}, 0x20) 09:03:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x2}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 444.067194][ T3967] ? lock_release+0x522/0x720 [ 444.072752][ T3967] ? __might_fault+0xd3/0x180 [ 444.077453][ T3967] ? lock_downgrade+0x6e0/0x6e0 [ 444.082411][ T3967] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 444.088702][ T3967] ? btf_type_snprintf_show+0x140/0x140 [ 444.094277][ T3967] ? apparmor_capable+0x1d8/0x460 [ 444.099591][ T3967] ? security_capable+0x8f/0xc0 [ 444.104495][ T3967] __sys_bpf+0x1e4c/0x5410 [ 444.108940][ T3967] ? ksys_write+0x212/0x250 [ 444.113593][ T3967] ? bpf_link_get_from_fd+0x110/0x110 [ 444.118990][ T3967] ? rcu_read_lock_sched_held+0xd/0x70 [ 444.124563][ T3967] ? lock_release+0x522/0x720 [ 444.129262][ T3967] ? fsnotify+0x1050/0x1050 [ 444.133784][ T3967] ? ksys_write+0x12d/0x250 [ 444.138310][ T3967] ? rcu_read_lock_sched_held+0xd/0x70 [ 444.143887][ T3967] ? lock_acquire+0x442/0x510 [ 444.149028][ T3967] ? lock_release+0x522/0x720 [ 444.153905][ T3967] ? trace_hardirqs_on+0x38/0x1c0 [ 444.158960][ T3967] __x64_sys_bpf+0x75/0xb0 [ 444.163659][ T3967] ? syscall_enter_from_user_mode+0x21/0x70 [ 444.170295][ T3967] do_syscall_64+0x35/0xb0 [ 444.174734][ T3967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 444.181454][ T3967] RIP: 0033:0x4665e9 [ 444.185372][ T3967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 444.206590][ T3967] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 09:03:10 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@l2tp={0x2, 0x0, @remote, 0x1}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000140)="5f55cc1d9489d4bba6bb3fc7bb0481132b8ff86ad22efacde23f82cf19075b40bd4ebafb784a812148f78929bce01e1f8a22eedb6c9ddc7932a7ab73e158c042b1de54ab3edc257163fc717643d8e70332b68fa3483f7aea83e5e3eab0271a05ad70d683b61c23160e0f87ed2b16fc16880e595dd65960cf84439b5b16242dde48fb1c90d2bac33cf7f49f8c7fd3c55425fc6cd52799c501944a78d56e7e356238b6ec499d5e354af043e250bbd204c18f0ff7f477f18d6563bbc2100e2416898346952addad441b5e6132934115b4f1223ee2a14747afbed0e8bc11c55153ec62ba", 0xe2}, {&(0x7f00000002c0)="3887f41048be8842cfbeb81932871873d9b4050e4cb2ffea76ef8ec8cf3ca1eb8b7f581447c79b01332d04fbfe535572534aa7b78cddbdb97739fd46c4ded13622e5bba17f322648ea221f248936c5d4f0c7b7b7f8f64c3326ed08fa0c14b7ec6ffaa67b3e1585848d27e38e0fc07d611fe7a794bba864318089e81191d93b4e6d49dad24ccee0a582dc607476c1743d64e3772a08916420af00863265a800b2fc6912f8ac6fcdd424990e952041debc", 0xb0}, {&(0x7f0000000380)="c82f82512ac65e130bd0d12cdfdd1c72f833a6932153b8eea86d1149bcb4d601923e43bf98fc396fe60ea0db3cb9efd306050f895d0c3b0fd2b22c341dbf6e54854a425bc429c26625d23f76d8f82323fb54d0f8a7458a9e8297a99db1d70ae85ed97b4384332092441bafee535ad3ad9ceaca17d59d089207e553bf137ead0fd0d03293331734c91b9a095553afe0c8ca74148557e8461e9ece0d7adb91a4449da64a4de97398923cf5a410cfd118a277f1f4c68a2780b83068964cbedf49", 0xbf}, {&(0x7f0000000440)="ed288bee6f86385b2d540635da8e63d3836469b393b47809fbac6a483a2b19541ce8e801c399ae2f7239bebe852b6eb4324e443ece8aa82141149d8f769cb9a41f512594674bedeacb7fbae1f384bb39a5c52911ca91ca9b731a6b5ac79f57db1e56ba3c58665f7ff0c765e0cae411192c6fd59413c27d406c77359c887317a26026ad8beb840bef43ffefe0fb654925d7c22f897ee86291a8660f9ef9b76d732a3f76dca8c3556ee047fce622fa2b4129361689f4afa23b0f27e0e0c036695ffbd83cec278bd89d0f316c57990b70026474a8e8085608fd3c519d026e", 0xdd}, {&(0x7f0000000540)="86d9d6aad4a8d94260bdb36285b48c5b2e8d1da72cb1c4c30d17e984d726ee29f1de3c79b648876d0a81d73e375e84ef79ee5cb8f26a858cb1a0a851dd911b40913cdba2b1d97856da31cf4f03dbaa4c7a64d30b21e722e5f4462a86753d24650066743247c897bcd82d839835f1dacf29a4de4c77f55bae672c9fa2898840649ed746b2f9db22", 0x87}, {&(0x7f0000000600)="87b4359aec26bcc3d9969ccddc20f32d2b4957f5eda37d4c1fd61a462825401f749eaf811f866f354a469a80a44ccdff8111a0c394cb7601898d9d89b834bd88442c10f1eb13064b922fcb513066b79dfbd2e8b4396f00c13350f8dbbe43174be0cfb4c73c78e858e477fbf93e04d12df0daac1f56b35d289d6a4e2e2947741549c025690681802d1f6148574082e01194bd4ae48e089eb3c03d3a70cc74b26072bd327311b841c67b440bbd2ddb2c1dff844d072fb782ac0690820e058fe2044f", 0xc1}, {&(0x7f0000000700)="062fc6e92422c14fa885d1b5c27394a181f59a64d86b9d5ddcc7f6c4174328ed2f182b8a8df4eb78312d08970ccdd55ecec8f8b4924dd3b05188036e627931ec5bc4c8078ad96671e41d51410ac2e04fee090fa5c59d304bfc4e5ab2ecb175c5a91ff1c28aed60c367693adeaeea3a69253fd894c9b192886b6fcc88e175965bfd3a91a013531e67242c4f29e20bcc68cd096ac188eb952ad0212d1d7dc6b7f9cd65dfd556471276", 0xa8}, {&(0x7f00000007c0)="4de86942cb699d9f96e4cffc06e98104c10deb40f5452d768cb21b53b1c0d2ae84b3427893dc30c1f70ac7259dc521c9dcf8b7b77625b83fb53cb5edddacdc9b924132f49bd20c917db2a3d0e45b3d0c98759990be09932c2a950ee68a0c42e07f06bd3acb2f8c089c93f9ca9a9208438418482821fcb082b70c041c6121e9dee048ee6a171620f66704443d73e53baee0d5442b594d47b7546d85b8593d0228abbf3f0b4c2ced00a4aa3bb3dec8bf4f20900e9d8b9b696ee2b0e6", 0xbb}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000001880)="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", 0xfa}], 0xa, &(0x7f0000001a40)=[{0x70, 0x110, 0x3, "4fb62da1eda90e731791ccf221ad5f8a62e71e96f2141f1bcb36a241ab89b62934d2f5322559366b84a19f2e71ea02a9ed7fa2bea38f4662726e1f0a8a98f98b66c7de633f1d9973d4efbda534e4171a5614d685e3afaf92ea27cf"}, {0xb0, 0x1c, 0x0, "4e248bce66da3cc71d0425df80a691a6f36a08d831fc7f3267837c7503d66f65e7a5ce8728f807b8ce6d7d9bd1d164f85d790905ffda1c8f42bdc0bda32d029ba89607b3e7f08c5e93b36e1bf09dd6e3675011a3a6023deb5e6a05a156e0dc3cc022d8d370afcbe608b0e311f5cdb68cb7b6bfeb51d619738a69ffd16e610183fd9cf38c2183ccae86c06b631c36580b8167ed184d075743fffa7336b8e88b"}, {0xe0, 0x11, 0x3f, "2942cad8f2adf872a972ce1cbb5f35bc427b064cfd921dda7abe7444d646681c82957b5b558dadb828c9daca0b1601eb6294295adf33d7d98c9b33bb8982ba9a60e0595036ceb7a6b96f88ffa0222660076a1357957b4550725276c37b855f030bc802e97cb3eb7d516f31cc03445b0be5d089e414b66caff946a92489a715efbdcbbb8a1ee8538d96ce31c13f61fab02e67dc2459b65d945ea99e6f6c49c48d175b0ee4d2aed1f7021a54980574a92069a0c82c0ed2262a815af807ac77c46fc45d031d11883dc3cc62435446a3"}, {0xf8, 0x10a, 0x2, "be73164b93d79db46711a9545fc39336830c35eeebb877b678db71734a23b9c561cc232dcb4bd48aa2f5b5b1a230ef7119ec6dc5b51469592fcc50e81ef1903c95592a37232b94b4be5809fa2166436db4ad15d1f5cad995290c8f62ee1c543414787f076bf8bf105e7a25f64d01e03764ef8351517c96dab52b16fc92e2576ecfed427d32c67b5dcb8b0cb285076548fa5fd219811f14a5657e3722f3064be508b7370f2f4362f47ebac04789499b84c94f5b7faa6d56c582a8f28bbe81142d82099568ba224e4890aa92fd3bbd732806985556dbd86c8c78f466ad32f63a9f5d"}], 0x2f8}, 0x10) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0xfffffd1c, 0x0, 0x1}, 0x20) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@map=r1, 0xffffffffffffffff, 0x1}, 0x10) 09:03:10 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='io.stat\x00', 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0xffffffff}, @fwd={0xd}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x11d, 0x87, 0x1}, 0x20) [ 444.215030][ T3967] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 444.223191][ T3967] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 444.231280][ T3967] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 444.239261][ T3967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 444.247330][ T3967] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:10 executing program 1 (fault-call:0 fault-nth:19): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x3}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:10 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:10 executing program 0: r0 = getpid() r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x2, &(0x7f0000000040)='}\x00'}, 0x30) 09:03:10 executing program 5: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) r0 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0xd}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='rdma.current\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000380)=r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r2, 0x0, 0x1a, 0x76, &(0x7f0000000080)="116d90084809dc6b9ba01fd55e32cb769bd2b6508360fc5ebf19", &(0x7f00000000c0)=""/118, 0x9, 0x0, 0x3, 0x2a, &(0x7f0000000440)="e8ca62", &(0x7f0000000180)="66ace7db7d807a5495baff0f81a27210d9754f63d2f9dcf7f88ab39ac7cb4c8df2d8beb51801571285f2", 0x0, 0xffffffff}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='xprtrdma_post_recv\x00', r2}, 0x10) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000000480), 0x2, 0x0) openat$cgroup_procs(r3, 0x0, 0x2, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)={0xffffffffffffffff}, 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@cgroup=r3, r4, 0x1e}, 0x10) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000300)={r2, r2}) 09:03:10 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0xffffffff}, @fwd={0xd}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x11d, 0x87, 0x1}, 0x20) 09:03:10 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x4, 0x10001, 0x9, 0x8000, 0x40, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x1}, 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x80000001}, 0xc) bpf$ITER_CREATE(0x21, &(0x7f0000000140)={r1}, 0x8) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x10000, 0x8}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={0xffffffffffffffff, r2}, 0xc) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:10 executing program 4: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='devices.list\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000015c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f0000001540)={0x0, 0x80, 0x9, 0x3, 0x4, 0x40, 0x0, 0x0, 0x420, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000014c0), 0x8}, 0xc0, 0x81, 0x8, 0x0, 0x100000001, 0x8000, 0x2, 0x0, 0x8000, 0x0, 0xffffffff}, r1, 0xc, 0xffffffffffffffff, 0x8) sendmsg$sock(r0, &(0x7f0000001500)={&(0x7f0000000040)=@ethernet={0x306, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}}, 0x80, &(0x7f0000001440)=[{&(0x7f00000000c0)="66f77a4efd82dc9fd4b07c8d6b739ec18c2b652220598cf8bd59d08e3779c458b5363db160659be356096c821bcfc206656cf5c947060a8dbcef3e4f3d170686144ac01c7f0309aa8a5501e09e09fddc6782bdd8d1d70a44a2e1df066ea4a860e93c963be0d98cafa0bf74aee2824225312ec589a8159f7a61232820fc0be4016507b7a6dcf929597627ce9d0b09358ae08255b3a3022878810de67b7c5bd1db3adb78547adde2611e748b0e8fa9596010147f592af446258b28d54505a264d2851fb1042e26eb505845ee931d", 0xcd}, {&(0x7f00000001c0)="1d644fe0c7a867a2bd3c8c567f07fbef51deafb66579e6f4cdedcd61720b9d072cbe90326f41c12701c5b5b7646bb6874fa516d4e4a0e37baf88d525241dfff7ab80aa2342ffb00147b56eefa4b607755f409377cc74b94f8bf3dddc", 0x5c}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="309a6df19d5235241292acbff12d9af747ae3fc891f89030e605dfdf638595aa3b2791917b113aab1994fe4d674d216f5c6ed948c0578bd58aa76cf9561a805f6594fdb50e52bb72dbe1ba470eaaa0a87e222db5bec6134b4716962341e2718c802c9216799620f5ca6f1ad23c83ecdffc65ad1d0d894c9bed733ff0cbc5df60151bfd7254562c5dfa66ba1bba2ab930f5bccbf991b0219dc61965efd88d022f7ef081ff6859a35ff00dda187305c3d00f925300bb1896465b4cfaf9a80754a3977ab8ee0d6a809c751e4ca659bf97bdba9f2d0c48b1f5cf37", 0xd9}, {&(0x7f0000000240)="8ec26fa22dfc2d8dea82d64c8fe0c99f322aefe483b24b1e1c6476a6e3417a3359d940360988cd3ea550", 0x2a}, {&(0x7f00000013c0)="6d3092112d085b61439ed3c500733ad4954fb52911b42d41f0746d025bb121cb40ac3b20c26aadadaf5f431426140edd95a06b0d5b7e57d81e1e07e9c54ce89fa06bdd6e711e486dfcc162e8ab6e", 0x4e}], 0x6, &(0x7f00000014c0)}, 0x10) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x4}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfc, 0xfc, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0xffffffff}, @fwd={0xd}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x11d, 0x87, 0x1}, 0x20) [ 444.462013][ T4009] FAULT_INJECTION: forcing a failure. [ 444.462013][ T4009] name failslab, interval 1, probability 0, space 0, times 0 [ 444.524481][ T4009] CPU: 1 PID: 4009 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 444.534685][ T4009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.544753][ T4009] Call Trace: [ 444.548483][ T4009] dump_stack_lvl+0xcd/0x134 [ 444.553103][ T4009] should_fail.cold+0x5/0xa [ 444.557633][ T4009] ? kvmalloc_node+0x61/0xf0 [ 444.562253][ T4009] should_failslab+0x5/0x10 [ 444.566778][ T4009] __kmalloc_node+0x75/0x380 09:03:10 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 444.571397][ T4009] kvmalloc_node+0x61/0xf0 [ 444.575859][ T4009] btf_check_all_metas+0x634/0xa40 [ 444.581002][ T4009] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 444.587661][ T4009] ? btf_parse_str_sec+0x1e8/0x2e0 [ 444.592803][ T4009] btf_new_fd+0x976/0x2450 [ 444.597259][ T4009] ? rcu_read_lock_sched_held+0xd/0x70 [ 444.602836][ T4009] ? lock_acquire+0x442/0x510 [ 444.607537][ T4009] ? rcu_read_lock_sched_held+0xd/0x70 [ 444.613023][ T4009] ? lock_release+0x522/0x720 [ 444.617721][ T4009] ? __might_fault+0xd3/0x180 [ 444.622769][ T4009] ? lock_downgrade+0x6e0/0x6e0 [ 444.627642][ T4009] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 444.633998][ T4009] ? btf_type_snprintf_show+0x140/0x140 [ 444.639934][ T4009] ? apparmor_capable+0x1d8/0x460 [ 444.645114][ T4009] ? security_capable+0x8f/0xc0 [ 444.649998][ T4009] __sys_bpf+0x1e4c/0x5410 [ 444.654705][ T4009] ? ksys_write+0x212/0x250 [ 444.659236][ T4009] ? bpf_link_get_from_fd+0x110/0x110 [ 444.665047][ T4009] ? rcu_read_lock_sched_held+0xd/0x70 [ 444.670711][ T4009] ? lock_release+0x522/0x720 [ 444.675413][ T4009] ? fsnotify+0x1050/0x1050 [ 444.680028][ T4009] ? ksys_write+0x12d/0x250 [ 444.684732][ T4009] ? rcu_read_lock_sched_held+0xd/0x70 [ 444.690221][ T4009] ? lock_acquire+0x442/0x510 [ 444.694913][ T4009] ? lock_release+0x522/0x720 [ 444.699962][ T4009] ? trace_hardirqs_on+0x38/0x1c0 [ 444.705102][ T4009] __x64_sys_bpf+0x75/0xb0 [ 444.709627][ T4009] ? syscall_enter_from_user_mode+0x21/0x70 [ 444.715819][ T4009] do_syscall_64+0x35/0xb0 [ 444.720257][ T4009] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 444.726168][ T4009] RIP: 0033:0x4665e9 [ 444.730070][ T4009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 444.750387][ T4009] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 444.759162][ T4009] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 444.767666][ T4009] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 444.775650][ T4009] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 444.783735][ T4009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 444.792078][ T4009] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:10 executing program 1 (fault-call:0 fault-nth:20): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:10 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002440)={&(0x7f0000002040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000002300)=[{&(0x7f00000020c0)=""/125, 0x7d}, {&(0x7f0000002140)=""/222, 0xde}, {&(0x7f0000002240)=""/44, 0x2c}, {&(0x7f0000002280)=""/98, 0x62}], 0x4, &(0x7f0000002340)=""/241, 0xf1}, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002540)={&(0x7f0000002480)=ANY=[@ANYBLOB="9feb010018000000000000001800000018000000070000000d0000000000f03501000000030000000000000805000000002e3061300000"], &(0x7f00000024c0)=""/124, 0x37, 0x7c}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002600)=@bpf_tracing={0x1a, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x1f}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3}, @generic={0xfe, 0x0, 0x2, 0x100, 0xffffff01}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0x75, &(0x7f0000000080)=""/117, 0x40f00, 0x8, '\x00', r0, 0x19, r1, 0x8, &(0x7f0000002580)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000025c0)={0x2, 0xc, 0x81, 0x9}, 0x10, 0x13a90}, 0x78) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000100)=@llc={0x1a, 0x5808a409975fadc4, 0x3, 0x7, 0x5, 0x0, @local}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000180)="65455f5d145b9bf74fe46b1a225184c90cb6ade8bc22a2971456925dcb71bd576fe65d896a38ca446a08da0d0c7b6602eebc2268f2eb9c3e1825e1c8428fb2639977893843dbcfe8661b41699a54edc74140e8ff720979f127a698089977eb38aba416d4aafeaf0369866cfb0f08e105d894c46215b40b89185591b5c43b6dc05e7f8f0c48886b7a8f47a679af95ce2c39281da1", 0x94}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000240)="b1853fea6607251234f3bcf71da8eb73f365b666456e4da6d8be5f05af3f2fcab28266982cc508fe01ee00960bf2dab3cfb9af9f80cc8279c41c3080", 0x3c}, {&(0x7f00000012c0)="1a37c9f086a01aae4cf42598b6cfeee99a99247f675edd531733af7588816cc2f9ef7cda52bc494ed2cc04740213e04a8a9abfd4bd31adb765327148eaf61fab22975ef50cb9352860ce1b74945e52311e8cc71cbd276fa2b22b269efc25f37b77232c8e0463343e7b1b2bd6d45e4193f781997c23a17ca581c0ef4b6a39b9d449a3bafa6e064b24f50b", 0x8a}], 0x4}, 0x0) 09:03:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x5}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:03:10 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f00000001c0)={0x0, 0x0}, 0x1c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x10, &(0x7f0000000100)={&(0x7f0000000000)=""/220, 0xdc, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r1, 0x4) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r2, 0x20, 0x0, 0x7, &(0x7f0000000200)=[0x0, 0x0], 0x2}, 0x20) 09:03:10 executing program 4: bpf$BPF_BTF_LOAD(0x63, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:11 executing program 4: bpf$BPF_BTF_LOAD(0x5f5e0ff, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:11 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x801, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000140)={'dummy0\x00', @broadcast}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={0xffffffffffffffff}, 0x4) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000300)={0xffffffffffffffff, r3}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000400)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/140, 0x8c}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000008e27cbcbce6b13f6ab5f6074a649f0bccbda8b1ce594ed3b997f1b7e84447c0d197f9b6a67f8531b255c4280d489d55cfc517b5d9efa6191123152b9f17e67170419ad01320df0d7bed3ee431a6e9e8ef615300000000000000"], 0x98}, 0xa19535896ea1c98) ioctl$TUNSETOWNER(r2, 0x400454cc, r5) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000180)=0x159) [ 444.979777][ T4047] FAULT_INJECTION: forcing a failure. [ 444.979777][ T4047] name failslab, interval 1, probability 0, space 0, times 0 [ 444.997307][ T4047] CPU: 1 PID: 4047 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 445.007955][ T4047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.018020][ T4047] Call Trace: [ 445.021419][ T4047] dump_stack_lvl+0xcd/0x134 09:03:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0xe, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000005000000000000d58b31094d6cdd15000000000000000000", @ANYRES32, @ANYBLOB="00000000ff0f00001800000002000000000000000300000085100000fdffffff850000007f0000009d92feff100000001410020080000000180000000100000000000000090000009500000000000000"], &(0x7f0000000240)='syzkaller\x00', 0x4, 0xcd, &(0x7f00000004c0)=""/205, 0x0, 0x1a, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000005c0)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x4, 0x3, 0x0, 0x82}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="930095bd5c93fe3d48767a602613fc4c16c9e9c83e83bffa857f8135a19bfbf3547625284a4253be6c57aff290918de06fe60824cb3430497410d0bde666c6d651026204f585a592e119a1d2b16232e7622987382a4d31d702ff0eece6192f50284c9793e5df6f60f37f76d9c8770a32bd1d4894e2b4583bc73ea56ff55aceddc3bbc4080387ebe2fec100ec83da901b99e98c5528fc196da198f617fefe9e5c66dd064e6d15431e843fdc90", 0xac}], 0x1, &(0x7f00000002c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_retopts={{0xa0, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0x74, 0x1, 0x5, [{@broadcast, 0x9}, {@broadcast, 0x400}, {@multicast2, 0x4}, {@multicast2, 0xffffffff}, {@broadcast, 0x40}]}, @generic={0x83, 0x5, "b52aa5"}, @ssrr={0x89, 0xb, 0xa5, [@local, @empty]}, @rr={0x7, 0x1b, 0xd6, [@initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @lsrr={0x83, 0xf, 0x6c, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x2b}, @empty]}, @lsrr={0x83, 0x27, 0x3f, [@multicast2, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x19}, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x3, 0xcd}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010100, @remote}}}, @ip_retopts={{0x7c, 0x0, 0x7, {[@ssrr={0x89, 0x13, 0x50, [@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @ssrr={0x89, 0x1b, 0xb0, [@rand_addr=0x64010100, @private=0xa010102, @multicast2, @rand_addr=0x64010102, @empty, @broadcast]}, @timestamp_addr={0x44, 0xc, 0x2b, 0x1, 0x7, [{@multicast1, 0x9}]}, @noop, @lsrr={0x83, 0x1f, 0xc5, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x3a}, @multicast2, @rand_addr=0x64010102, @remote]}, @end, @generic={0x89, 0xd, "c65d8b5067ada71d5e56bb"}, @ra={0x94, 0x4}]}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x54, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0x9c, 0x1, 0x9, [{@private=0xa010102, 0xfffffff7}, {@private=0xa010100, 0x7a}, {@dev={0xac, 0x14, 0x14, 0x38}, 0xffffffff}, {@empty, 0x40}, {@remote}]}, @rr={0x7, 0x17, 0xba, [@broadcast, @empty, @local, @private=0xa010102, @loopback]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @broadcast}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}], 0x200}, 0x1) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 445.026048][ T4047] should_fail.cold+0x5/0xa [ 445.030881][ T4047] ? kvmalloc_node+0x61/0xf0 [ 445.035547][ T4047] should_failslab+0x5/0x10 [ 445.040680][ T4047] __kmalloc_node+0x75/0x380 [ 445.045296][ T4047] kvmalloc_node+0x61/0xf0 [ 445.049742][ T4047] btf_new_fd+0x9fb/0x2450 [ 445.054179][ T4047] ? rcu_read_lock_sched_held+0xd/0x70 [ 445.060190][ T4047] ? lock_acquire+0x442/0x510 [ 445.064884][ T4047] ? rcu_read_lock_sched_held+0xd/0x70 [ 445.070638][ T4047] ? lock_release+0x522/0x720 [ 445.075807][ T4047] ? __might_fault+0xd3/0x180 [ 445.080805][ T4047] ? lock_downgrade+0x6e0/0x6e0 [ 445.086119][ T4047] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 445.092384][ T4047] ? btf_type_snprintf_show+0x140/0x140 [ 445.098050][ T4047] ? apparmor_capable+0x1d8/0x460 [ 445.103115][ T4047] ? security_capable+0x8f/0xc0 [ 445.107988][ T4047] __sys_bpf+0x1e4c/0x5410 [ 445.112424][ T4047] ? ksys_write+0x212/0x250 [ 445.117071][ T4047] ? bpf_link_get_from_fd+0x110/0x110 [ 445.122695][ T4047] ? rcu_read_lock_sched_held+0xd/0x70 [ 445.128170][ T4047] ? lock_release+0x522/0x720 [ 445.133208][ T4047] ? fsnotify+0x1050/0x1050 [ 445.137854][ T4047] ? ksys_write+0x12d/0x250 [ 445.142542][ T4047] ? rcu_read_lock_sched_held+0xd/0x70 [ 445.148054][ T4047] ? lock_acquire+0x442/0x510 [ 445.152839][ T4047] ? lock_release+0x522/0x720 [ 445.157545][ T4047] ? trace_hardirqs_on+0x38/0x1c0 [ 445.162721][ T4047] __x64_sys_bpf+0x75/0xb0 [ 445.167248][ T4047] ? syscall_enter_from_user_mode+0x21/0x70 [ 445.173168][ T4047] do_syscall_64+0x35/0xb0 [ 445.177863][ T4047] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.183783][ T4047] RIP: 0033:0x4665e9 [ 445.187772][ T4047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 445.207844][ T4047] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.216451][ T4047] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 09:03:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:03:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x6}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 445.224523][ T4047] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 445.232600][ T4047] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 445.240582][ T4047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 445.248649][ T4047] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:11 executing program 1 (fault-call:0 fault-nth:21): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 09:03:11 executing program 0: r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') 09:03:11 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x1, 0x3, 0x3, 0x4, 0x2, 0x4}, @call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f0000000040)='GPL\x00', 0x7cf6, 0x1a, &(0x7f0000000080)=""/26, 0x41100, 0x8, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f00000000c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x0, 0xd, 0x81, 0x3f}, 0x10, 0xffffffffffffffff}, 0x78) 09:03:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x7}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000140)=""/135, 0x0, 0x87, 0x1}, 0x20) 09:03:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x8}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:11 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x102, 0x102, 0x6, [@int={0x8, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x50, 0x3}, @const={0x3, 0x0, 0x0, 0xa, 0x4}, @enum={0x2, 0x9, 0x0, 0x6, 0x4, [{0x1, 0xd2}, {0xc, 0x80000001}, {0x1, 0xffff}, {0x7, 0x81}, {0x6, 0x71fa}, {0x9, 0x80000001}, {0x1, 0x2}, {0x1, 0x8}, {0xe, 0x7}]}, @struct={0xe, 0x4, 0x0, 0x4, 0x1, 0x8, [{0x7, 0x5, 0x1}, {0x5, 0x0, 0x9}, {0x6, 0x0, 0x101}, {0x5, 0x3, 0x2}]}, @datasec={0x1, 0x4, 0x0, 0xf, 0x2, [{0x4, 0x8, 0x10}, {0x1, 0xffffffff, 0x7fff}, {0x1, 0xffffffc1, 0xfdd}, {0x3, 0x6e, 0x79af}], "771d"}, @volatile={0xa, 0x0, 0x0, 0x9, 0x4}, @func={0xd, 0x0, 0x0, 0xc, 0x4}]}, {0x0, [0x61, 0x5f, 0x0, 0x0]}}, &(0x7f0000000400)=""/4096, 0x122, 0x1000, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001480)={r0, 0x10, &(0x7f0000000240)={&(0x7f0000001400)=""/97, 0x61, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x1b, 0xa, &(0x7f0000001540)=ANY=[@ANYBLOB="180000000800000000000000070000003f0000000000000018000000050000000000000000000000181b00000530", @ANYRES32=r1, @ANYBLOB="0000000000000000180000000004000000000000030000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x8, 0x13, &(0x7f0000000140)=""/19, 0x41100, 0x4, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x1, 0xe, 0x4, 0x9}, 0x10, r3}, 0x78) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)=0xbd5d, 0x12) 09:03:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:11 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x40001}, 0x20) [ 445.574382][ T4091] FAULT_INJECTION: forcing a failure. [ 445.574382][ T4091] name failslab, interval 1, probability 0, space 0, times 0 09:03:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000140)=""/135, 0x0, 0x87, 0x1}, 0x20) [ 445.615299][ T4091] CPU: 1 PID: 4091 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 445.626120][ T4091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.636199][ T4091] Call Trace: [ 445.639484][ T4091] dump_stack_lvl+0xcd/0x134 [ 445.644101][ T4091] should_fail.cold+0x5/0xa [ 445.648914][ T4091] ? kvmalloc_node+0x61/0xf0 [ 445.653520][ T4091] should_failslab+0x5/0x10 [ 445.658039][ T4091] __kmalloc_node+0x75/0x380 [ 445.662832][ T4091] kvmalloc_node+0x61/0xf0 [ 445.667509][ T4091] btf_new_fd+0xa1e/0x2450 [ 445.672121][ T4091] ? rcu_read_lock_sched_held+0xd/0x70 [ 445.677620][ T4091] ? lock_acquire+0x442/0x510 [ 445.682499][ T4091] ? rcu_read_lock_sched_held+0xd/0x70 [ 445.687986][ T4091] ? lock_release+0x522/0x720 [ 445.692683][ T4091] ? __might_fault+0xd3/0x180 [ 445.697422][ T4091] ? lock_downgrade+0x6e0/0x6e0 [ 445.702294][ T4091] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 445.708908][ T4091] ? btf_type_snprintf_show+0x140/0x140 [ 445.714484][ T4091] ? apparmor_capable+0x1d8/0x460 [ 445.719616][ T4091] ? security_capable+0x8f/0xc0 [ 445.724510][ T4091] __sys_bpf+0x1e4c/0x5410 [ 445.729115][ T4091] ? ksys_write+0x212/0x250 [ 445.733987][ T4091] ? bpf_link_get_from_fd+0x110/0x110 [ 445.739378][ T4091] ? rcu_read_lock_sched_held+0xd/0x70 [ 445.744866][ T4091] ? lock_release+0x522/0x720 [ 445.749644][ T4091] ? fsnotify+0x1050/0x1050 [ 445.754434][ T4091] ? ksys_write+0x12d/0x250 [ 445.759568][ T4091] ? rcu_read_lock_sched_held+0xd/0x70 [ 445.765088][ T4091] ? lock_acquire+0x442/0x510 [ 445.769998][ T4091] ? lock_release+0x522/0x720 [ 445.774997][ T4091] ? trace_hardirqs_on+0x38/0x1c0 [ 445.780143][ T4091] __x64_sys_bpf+0x75/0xb0 [ 445.784588][ T4091] ? syscall_enter_from_user_mode+0x21/0x70 [ 445.790509][ T4091] do_syscall_64+0x35/0xb0 [ 445.795048][ T4091] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 445.800972][ T4091] RIP: 0033:0x4665e9 [ 445.806247][ T4091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 445.826469][ T4091] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 445.835084][ T4091] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 445.843244][ T4091] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 445.851228][ T4091] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 445.859385][ T4091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 445.867365][ T4091] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:12 executing program 1 (fault-call:0 fault-nth:22): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f0018290000000100000030080000000000000000003c6b912e0000e6380180", @ANYRES32=r1, @ANYBLOB="200000000500517e34fd2e8052ef95e63aa5c00b00000538800007000000a57a"], &(0x7f00000000c0)='syzkaller\x00', 0x7, 0x37, &(0x7f0000000100)=""/55, 0x41100, 0xe, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000140)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x1, 0x6, 0x80}, 0x10}, 0x78) 09:03:12 executing program 5: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000015c0)) r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffb, 0x4000005}, 0xffffffffffffff05) close(r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000017c0)={0x39, 0x6, &(0x7f00000016c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@alu={0x7, 0x0, 0x0, 0x8, 0x1, 0x10}, @ldst={0x2, 0x2, 0x0, 0xa, 0x5, 0x20, 0xfffffffffffffff0}, @jmp={0x5, 0x1, 0x0, 0x7, 0x9, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000001700)='GPL\x00', 0x10001, 0x0, 0x0, 0x40f00, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001740)={0x1, 0x4}, 0x8, 0x10, &(0x7f0000001780)={0x5, 0xf, 0x8, 0x5}, 0x10}, 0x78) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x3, 0x4}, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)="a0b44fdc58d5bad89048276a478c766d1ae4837a21275ea893d0af1ce4fb27dc57d7c061675b01f47e82ffcd1392a9dbffe8c87f9c042d90b733385f367c62e300dd47fe30599c95b6cf929a11de59f4222bd2cdec649543e5c8ad6baf680d658550dfb6b2e6a7a846a7596fa34cde0f54cd33783257b1f16718fc07", 0x7c}, {&(0x7f0000000100)="87b56674c87f727ac28d5f38fc551be00bd2f411eed2e390005a5587e8bc466655873e07db4f240b26e1954001823fc761bc98eb1d414499aebaf2464a7b9f6eb1f4d31f0a98971b2654f7371bd79ba53129555b1bb2185465bf8cd57bdaf26726264b49", 0x64}], 0x2, &(0x7f00000001c0)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x7ff}}, @timestamping={{0x14, 0x1, 0x25, 0x7f}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x78}, 0x40000) sendmsg(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000080)=@in={0x2, 0x4e21, @private=0xa010101}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000340)="23ad1e611aaef1e45c81ab3365dde4926f70bad912c1b419c965452bfd6846ff5d501f4f2ce33b6bcebf072497edf70430f439c867", 0x35}, {&(0x7f0000000380)="3cdf24dd13fe76e0cd4934fa1cb809d0933eaf66edc072b5b17dbbb2ebb52f18e39a6c1acf6551aa436270811a59150e7dee026d72031e76f0889a3c3c716950bc42ba508fa238fb201fc5d0dc88e0ac889e43baacb8a3b8abd6cf7cfb89b0dc5c876e183e9e5cb4ad8f6fcf46e8832f4d4b6ce187b87e164d70e675f093e904f5c9ec1dbca30ac18f3a950e656fd7859e112e7a8bc1395c", 0x98}, {&(0x7f0000000440)="50e2d72ad9ea1da2b03b8c9e9f7cdfb1a50b05f94cada5858a3e0ad1b9355b21719144fb49103245e9e69477b189cfd4651aa969ea5f5ddbdb30d35801c9f35c3a4615d5ce3b34410d9bc0ded810f26f88eda56b9018b22dc5c70296d6b690897e85a8461e6bac070654f0898dbbff86d3da45b6f2bb68b1f1ca7893bac595f7a0aa84c66e55e41d6519d4681afb58d62b5638943e6db1cde54c271743125c5f781215bd9dc3e362caece57de10350", 0xaf}, {&(0x7f0000000500)="58517523b054a9237332385576a7ad8d22ef3634c7a61f0ad0c4ca994017d1fe3a501299f4728c5982380a6f9fd5b94ae5563423206a777a1fd3a56a44a8014d8b381b2e4a2508cfd5f76f811b1011e857d6fdabea5b0f2580547e3bbdded7679dffab004d2ff4b0d66940c646f43e6bb270d4f6474aea407f7af1d5db299033728096b1c26e6b60c2995be1095aa9398a1b", 0x92}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)}], 0x6}, 0x4800) 09:03:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0xa}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f0000000140)=""/135, 0x0, 0x87, 0x1}, 0x20) 09:03:12 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0x1, 0x28}, 0x10) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf0, 0xf0, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}, @ptr={0x1, 0x0, 0x0, 0x2, 0xffffffff}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x111, 0x87, 0x1}, 0x20) 09:03:12 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={0xffffffffffffffff, r1}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r2, 0x0, 0x0) sendmsg$sock(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000300)="39e49007a0d9f3b124a41d358c981bfbd32ab6fd71c93daa07a20a0d288948b1faf788116794b61a7b8006c76e4c966159d4e86f1c8884d03eaeba31d331bf9d5e9dcf4e6e55555d92a9c48934c6338a556d7545ec5a3f828c1b27e6db4251bcce4893d61d0e7d37f26590bd5252e1ea0feb2abed001e7120f6b69bec20aab2954de5fa18588be077b7f7b0ffe902e1bd7055e2df466c4ee76778c22b4434448936826ea59a0c2f6e51125c29f5c150c29f35fc80498818789716b5819836cb922a1c27735cca422ab99038eb6fd78ae885ba02404db33216605d4", 0xdb}], 0x1, &(0x7f0000000200)=[@txtime={{0x18, 0x1, 0x3d, 0x20}}, @mark={{0x14, 0x1, 0x24, 0xff}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x35}}], 0x78}, 0x20040000) 09:03:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0xc}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 446.077895][ T4125] FAULT_INJECTION: forcing a failure. [ 446.077895][ T4125] name failslab, interval 1, probability 0, space 0, times 0 09:03:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xe4, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}, @volatile={0xe, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x105, 0x87, 0x1}, 0x20) [ 446.161651][ T4125] CPU: 0 PID: 4125 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 446.172211][ T4125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.182365][ T4125] Call Trace: [ 446.185742][ T4125] dump_stack_lvl+0xcd/0x134 [ 446.190361][ T4125] should_fail.cold+0x5/0xa [ 446.194986][ T4125] ? kvmalloc_node+0x61/0xf0 [ 446.199876][ T4125] should_failslab+0x5/0x10 [ 446.204668][ T4125] __kmalloc_node+0x75/0x380 [ 446.209287][ T4125] kvmalloc_node+0x61/0xf0 [ 446.213729][ T4125] btf_new_fd+0xa41/0x2450 [ 446.218168][ T4125] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.223652][ T4125] ? lock_acquire+0x442/0x510 [ 446.228522][ T4125] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.234005][ T4125] ? lock_release+0x522/0x720 [ 446.238754][ T4125] ? __might_fault+0xd3/0x180 [ 446.243455][ T4125] ? lock_downgrade+0x6e0/0x6e0 [ 446.248321][ T4125] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 446.254603][ T4125] ? btf_type_snprintf_show+0x140/0x140 [ 446.260443][ T4125] ? apparmor_capable+0x1d8/0x460 [ 446.265663][ T4125] ? security_capable+0x8f/0xc0 [ 446.270627][ T4125] __sys_bpf+0x1e4c/0x5410 [ 446.275069][ T4125] ? ksys_write+0x212/0x250 [ 446.279597][ T4125] ? bpf_link_get_from_fd+0x110/0x110 [ 446.285165][ T4125] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.290801][ T4125] ? lock_release+0x522/0x720 [ 446.295500][ T4125] ? fsnotify+0x1050/0x1050 [ 446.300019][ T4125] ? ksys_write+0x12d/0x250 [ 446.304992][ T4125] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.310652][ T4125] ? lock_acquire+0x442/0x510 [ 446.316078][ T4125] ? lock_release+0x522/0x720 [ 446.320780][ T4125] ? trace_hardirqs_on+0x38/0x1c0 [ 446.326695][ T4125] __x64_sys_bpf+0x75/0xb0 [ 446.331219][ T4125] ? syscall_enter_from_user_mode+0x21/0x70 [ 446.337137][ T4125] do_syscall_64+0x35/0xb0 [ 446.342119][ T4125] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.348377][ T4125] RIP: 0033:0x4665e9 [ 446.352290][ T4125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 446.372378][ T4125] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 446.380805][ T4125] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 446.388998][ T4125] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 446.396979][ T4125] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 446.405075][ T4125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 446.413242][ T4125] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:12 executing program 1 (fault-call:0 fault-nth:23): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x5f, 0x0, 0x1}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000001080)={&(0x7f0000000a00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000a80)=""/49, 0x31}, {&(0x7f0000000ac0)=""/98, 0x62}, {&(0x7f0000000b40)=""/207, 0xcf}, {&(0x7f0000000c40)=""/236, 0xec}, {&(0x7f0000000d40)=""/243, 0xf3}, {&(0x7f0000000e40)=""/134, 0x86}], 0x6, &(0x7f0000000f80)=""/218, 0xda}, 0x101) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000280)="89", 0x1}], 0x1, &(0x7f0000000ec0)=ANY=[], 0x360}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000010c0)={0x11, 0x40, 0x7fff, 0x5, 0x400, 0xffffffffffffffff, 0x0, '\x00', r0, 0xffffffffffffffff, 0x5, 0x3, 0x1}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) 09:03:12 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000340), 0x6e, &(0x7f0000000900)=[{&(0x7f00000003c0)=""/120, 0x78}, {&(0x7f0000000440)=""/189, 0xbd}, {&(0x7f0000000500)=""/151, 0x97}, {&(0x7f00000005c0)=""/230, 0xe6}, {&(0x7f00000006c0)=""/44, 0x2c}, {&(0x7f0000000700)=""/227, 0xe3}, {&(0x7f0000000800)=""/49, 0x31}, {&(0x7f0000000840)=""/33, 0x21}, {&(0x7f0000000880)=""/123, 0x7b}], 0x9, &(0x7f00000009c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8}, 0x20) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}]}, &(0x7f0000000080)='syzkaller\x00', 0x8000, 0xec, &(0x7f00000000c0)=""/236, 0x41000, 0x1b, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000200)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x1, 0x3, 0xfffffffd}, 0x10, 0x23df8}, 0x78) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b40)={&(0x7f0000000b00)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'veth0_to_hsr\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000d00)={r0, &(0x7f0000000b80)="11383eb0d6737b0dd0c7f37951b1662e45b9fd9daa993b9a8de3b57c33d9669c8bcf33bbd46bfd038af32705a53c3f82b437cee0013d63c804f2064634bd97c339d28e4ea9b39a7e176d98f6fc9e00ef58d051ffdfd5fbc1f5dd446e989b54d23ceb512092865393141208a3682abc2c50999d8d300be32997", &(0x7f0000000c00)=""/248}, 0x20) 09:03:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0xe}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}, @fwd={0x7}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0xf9, 0x87, 0x1}, 0x20) 09:03:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x10}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:12 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x40, 0x2, 0x2, 0x8a, 0x0, 0x3, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0x800, 0xa5, 0x9, 0x7, 0xffff, 0x1, 0x8, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x20, 0x56, 0x7c, 0x9, 0x0, 0xffffffffffffff4c, 0x1013, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x40810, 0xffffffffffffffff, 0x6, 0x4, 0x7, 0x9, 0x40, 0x0, 0x10000, 0x0, 0x35d8}, r0, 0xb, r1, 0x4) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xcc, 0xcc, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}, @restrict={0x4, 0x0, 0x0, 0xb, 0x2}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0xed, 0x87, 0x1}, 0x20) [ 446.569553][ T4163] FAULT_INJECTION: forcing a failure. [ 446.569553][ T4163] name fail_usercopy, interval 1, probability 0, space 0, times 0 09:03:12 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x1b, 0x9, 0x101, 0x80, 0x1, 0x2, '\x00', 0x0, r0, 0x5, 0x4, 0x2}, 0x40) [ 446.694294][ T4163] CPU: 1 PID: 4163 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 446.704453][ T4163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.714876][ T4163] Call Trace: [ 446.721822][ T4163] dump_stack_lvl+0xcd/0x134 [ 446.726454][ T4163] should_fail.cold+0x5/0xa [ 446.731172][ T4163] _copy_to_user+0x2c/0x150 [ 446.735703][ T4163] bpf_verifier_vlog+0x1b2/0x2e0 09:03:12 executing program 5: ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'ipvlan0\x00', @link_local}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000180)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r2, 0x0, 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f00000001c0), 0x2, 0x0) recvmsg$unix(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/56, 0x38}, {&(0x7f0000000240)=""/239, 0xef}, {&(0x7f0000000340)=""/123, 0x7b}, {&(0x7f00000005c0)=""/11, 0xb}, {&(0x7f0000000400)=""/77, 0x4d}], 0x5, &(0x7f0000000500)}, 0x61) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000580)=0x8000) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0x8, 0x8, 0x3, 0x3f}, {0x3, 0x80, 0x8, 0x5}, {0x8, 0x1, 0x7f}, {0x2, 0x0, 0x3f, 0xfff}, {0xb7, 0x9, 0x0, 0x800}, {0x5, 0x80, 0x1, 0x7}, {0x7, 0x2, 0xff, 0x401}, {0x8, 0xba, 0x80, 0x9}]}) [ 446.740674][ T4163] __btf_verifier_log+0xbb/0xf0 [ 446.745893][ T4163] ? btf_id_cmp_func+0x90/0x90 [ 446.750950][ T4163] ? lock_release+0x720/0x720 [ 446.755656][ T4163] ? lock_release+0x522/0x720 [ 446.760385][ T4163] ? fs_reclaim_release+0x9c/0xf0 [ 446.765486][ T4163] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.771239][ T4163] ? lock_acquire+0x442/0x510 [ 446.775942][ T4163] __btf_verifier_log_type+0x771/0x8e0 [ 446.781621][ T4163] ? btf_var_show+0x380/0x380 [ 446.786437][ T4163] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.792107][ T4163] ? trace_kmalloc_node+0x32/0x100 [ 446.797218][ T4163] ? __kasan_kmalloc+0x9b/0xd0 [ 446.802221][ T4163] btf_new_fd+0x1f27/0x2450 [ 446.806937][ T4163] ? lock_acquire+0x442/0x510 [ 446.811617][ T4163] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.817609][ T4163] ? lock_release+0x522/0x720 [ 446.822404][ T4163] ? btf_type_snprintf_show+0x140/0x140 [ 446.827951][ T4163] ? apparmor_capable+0x1d8/0x460 [ 446.832987][ T4163] ? security_capable+0x8f/0xc0 [ 446.837857][ T4163] __sys_bpf+0x1e4c/0x5410 [ 446.842294][ T4163] ? ksys_write+0x212/0x250 [ 446.847178][ T4163] ? bpf_link_get_from_fd+0x110/0x110 [ 446.852649][ T4163] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.858146][ T4163] ? lock_release+0x522/0x720 [ 446.863164][ T4163] ? fsnotify+0x1050/0x1050 [ 446.868183][ T4163] ? ksys_write+0x12d/0x250 [ 446.872698][ T4163] ? rcu_read_lock_sched_held+0xd/0x70 [ 446.878538][ T4163] ? lock_acquire+0x442/0x510 [ 446.883211][ T4163] ? lock_release+0x522/0x720 [ 446.887899][ T4163] ? trace_hardirqs_on+0x38/0x1c0 [ 446.893445][ T4163] __x64_sys_bpf+0x75/0xb0 [ 446.898408][ T4163] ? syscall_enter_from_user_mode+0x21/0x70 [ 446.904494][ T4163] do_syscall_64+0x35/0xb0 [ 446.909559][ T4163] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 446.915456][ T4163] RIP: 0033:0x4665e9 [ 446.919433][ T4163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 446.939679][ T4163] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 446.948230][ T4163] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 446.956597][ T4163] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 446.965461][ T4163] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 446.976469][ T4163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 446.984452][ T4163] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:13 executing program 1 (fault-call:0 fault-nth:24): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc0, 0xc0, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}, @ptr={0x8, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0xe1, 0x87, 0x1}, 0x20) 09:03:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x48}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x50022, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)=0x1) 09:03:13 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x1, 0x71, 0x4, 0xfffffffb, 0x901, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x4, 0x4, 0x3}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x19, 0x6, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000b40a0000000000000300000095000000000000001815e94c6e59512076d23c317e0e4006513de6c9a48f27e8359a43aa76fd16658263a2458fd58904421c920bf1b9ba4ee3350d111be9d211b0df4322754db3831bb15daafd7d9ef8d0ecf03585411a2d35c0327c1f5fb312ed1c0d937a4db5a3ee63031eb0a333588dc8071dd154b6e10e130e63b23376316fb9e7eb721d24c98f341525c6283f0488b0f5", @ANYRES32=0x1, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0xfff, 0x61, &(0x7f00000000c0)=""/97, 0x40f00, 0xc, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000140)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x7, 0xc5ae}, 0x10}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x40}, @call={0x85, 0x0, 0x0, 0x23}, @generic={0x0, 0x8, 0x0, 0x9, 0x101}, @jmp={0x5, 0x1, 0x1, 0x6, 0x9, 0x80, 0x1}, @ldst={0x0, 0x2, 0x1, 0x8, 0x1, 0x10, 0xfffffffffffffffc}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}, @jmp={0x5, 0x0, 0xfedc886a3a28861f, 0xa, 0x4, 0x20, 0xfffffffffffffff0}]}, &(0x7f0000000340)='GPL\x00', 0x8000, 0x5d, &(0x7f0000000380)=""/93, 0x41000, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x6, 0x8, 0xfffffff9}, 0x10}, 0x78) 09:03:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x2, &(0x7f0000000000)=@raw=[@generic={0x40, 0xc, 0x0, 0x6}, @ldst={0x1, 0x1, 0x6, 0x0, 0x1, 0x1, 0xfffffffffffffff0}], &(0x7f0000000040)='syzkaller\x00', 0xff, 0x1000, &(0x7f00000002c0)=""/4096, 0x41000, 0x1a, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x1, 0x1}, 0x8, 0x10, &(0x7f00000000c0)={0x5, 0x6, 0x4}, 0x10}, 0x78) 09:03:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}, @enum={0x4, 0x6, 0x0, 0x6, 0x4, [{0xa, 0x7}, {0x1, 0x6}, {0x4, 0x209}, {0x8, 0x81}, {0x1, 0xd3}, {0x8, 0x2}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0xd5, 0x87, 0x1}, 0x20) 09:03:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x4c}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 447.214491][ T4204] FAULT_INJECTION: forcing a failure. [ 447.214491][ T4204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.240561][ T4204] CPU: 1 PID: 4204 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 447.250757][ T4204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.261004][ T4204] Call Trace: [ 447.264292][ T4204] dump_stack_lvl+0xcd/0x134 [ 447.269431][ T4204] should_fail.cold+0x5/0xa [ 447.273965][ T4204] _copy_to_user+0x2c/0x150 [ 447.278497][ T4204] bpf_verifier_vlog+0x1b2/0x2e0 [ 447.283453][ T4204] __btf_verifier_log+0xbb/0xf0 [ 447.288303][ T4204] ? btf_id_cmp_func+0x90/0x90 [ 447.293072][ T4204] ? btf_func_proto_log+0x6c9/0x870 [ 447.298538][ T4204] __btf_verifier_log_type+0x61a/0x8e0 [ 447.304100][ T4204] ? btf_var_show+0x380/0x380 [ 447.309401][ T4204] ? rcu_read_lock_sched_held+0xd/0x70 [ 447.314882][ T4204] ? trace_kmalloc_node+0x32/0x100 [ 447.319998][ T4204] ? __kasan_kmalloc+0x9b/0xd0 [ 447.324767][ T4204] btf_new_fd+0x1f27/0x2450 [ 447.329315][ T4204] ? lock_acquire+0x442/0x510 [ 447.334169][ T4204] ? rcu_read_lock_sched_held+0xd/0x70 [ 447.340066][ T4204] ? lock_release+0x522/0x720 [ 447.344768][ T4204] ? btf_type_snprintf_show+0x140/0x140 [ 447.350328][ T4204] ? apparmor_capable+0x1d8/0x460 [ 447.355368][ T4204] ? security_capable+0x8f/0xc0 [ 447.360409][ T4204] __sys_bpf+0x1e4c/0x5410 [ 447.364828][ T4204] ? ksys_write+0x212/0x250 [ 447.369599][ T4204] ? bpf_link_get_from_fd+0x110/0x110 [ 447.375065][ T4204] ? rcu_read_lock_sched_held+0xd/0x70 [ 447.380855][ T4204] ? lock_release+0x522/0x720 [ 447.385710][ T4204] ? fsnotify+0x1050/0x1050 [ 447.390322][ T4204] ? ksys_write+0x12d/0x250 [ 447.394828][ T4204] ? rcu_read_lock_sched_held+0xd/0x70 [ 447.400297][ T4204] ? lock_acquire+0x442/0x510 [ 447.405068][ T4204] ? lock_release+0x522/0x720 [ 447.409839][ T4204] ? trace_hardirqs_on+0x38/0x1c0 [ 447.415064][ T4204] __x64_sys_bpf+0x75/0xb0 [ 447.419693][ T4204] ? syscall_enter_from_user_mode+0x21/0x70 [ 447.425587][ T4204] do_syscall_64+0x35/0xb0 [ 447.430001][ T4204] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 447.435894][ T4204] RIP: 0033:0x4665e9 [ 447.439968][ T4204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 09:03:13 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x11, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x4, 0x1, 0x0, 0x4, 0x0, 0x3, [{0x6, 0x5, 0x438}]}]}, {0x0, [0x61, 0x2e, 0x5f, 0x0, 0x61, 0x0, 0x30]}}, &(0x7f00000002c0)=""/4096, 0x39, 0x1000}, 0x20) [ 447.459744][ T4204] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 447.468153][ T4204] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 447.476812][ T4204] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 447.484858][ T4204] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 447.492909][ T4204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 447.500870][ T4204] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:13 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffffffffd15, 0x1}, 0x20) 09:03:13 executing program 1 (fault-call:0 fault-nth:25): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x63}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) 09:03:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x99, 0x87, 0x1}, 0x20) 09:03:13 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x80, 0xff, 0x7, 0x4d, 0x80, 0x0, 0x2, 0xc6441, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10000001, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x4, 0xffffffff, 0x800, 0x6, 0x41e, 0x5, 0xc48, 0x0, 0x3, 0x0, 0x187a}, r0, 0xf, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$cgroup(r0, &(0x7f0000000180)='syz1\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000002000000000000000000000d00000000000000000000000100400000000000000000"], &(0x7f00000001c0)=""/178, 0x36, 0xb2, 0x1}, 0x20) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000240)='cpuhp_multi_enter\x00'}, 0x10) perf_event_open$cgroup(&(0x7f00000002c0)={0x4, 0x80, 0x1, 0x0, 0x3a, 0x9, 0x0, 0x4b7, 0x8, 0x9, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000200), 0x1}, 0x400c, 0xfffffffffffffff1, 0x6e, 0x3, 0x5, 0x0, 0x2, 0x0, 0x80000000, 0x0, 0x42}, r1, 0x4, r2, 0xc) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x6d, 0x9, 0x6, 0x3, 0x0, 0x7f, 0x80, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x200, 0x80, 0x4, 0x0, 0x810, 0xffff, 0x0, 0x0, 0x1, 0x0, 0x3}, r1, 0x4, r3, 0x5) 09:03:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x39, 0x87, 0x1}, 0x20) 09:03:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x68}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:13 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'ipvlan1\x00'}) 09:03:13 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000008a80)={&(0x7f00000088c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000008a40)=[{&(0x7f0000008940)=""/182, 0xb6}, {&(0x7f0000008a00)=""/12, 0xc}], 0x2}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000002600)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000002480)=[{&(0x7f0000000200)=""/93, 0x5d}, {&(0x7f00000002c0)=""/55, 0x37}, {&(0x7f0000000300)=""/49, 0x31}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000003c0)=""/2, 0x2}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/123, 0x7b}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x8, &(0x7f0000002500)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe8}, 0x10003) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000008b40)={0x11, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}]}, &(0x7f0000000040)='GPL\x00', 0x34e, 0xee, &(0x7f0000000080)=""/238, 0x41000, 0x2, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000008ac0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000008b00)={0x1, 0xb, 0x80000000, 0x100}, 0x10}, 0x78) [ 447.776197][ T4240] FAULT_INJECTION: forcing a failure. [ 447.776197][ T4240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.844670][ T4240] CPU: 1 PID: 4240 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 447.854788][ T4240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.865026][ T4240] Call Trace: [ 447.869219][ T4240] dump_stack_lvl+0xcd/0x134 [ 447.873934][ T4240] should_fail.cold+0x5/0xa [ 447.878452][ T4240] _copy_to_user+0x2c/0x150 [ 447.883225][ T4240] bpf_verifier_vlog+0x1b2/0x2e0 [ 447.888163][ T4240] __btf_verifier_log_type+0x649/0x8e0 [ 447.893898][ T4240] ? btf_var_show+0x380/0x380 [ 447.899131][ T4240] ? rcu_read_lock_sched_held+0xd/0x70 [ 447.904762][ T4240] ? trace_kmalloc_node+0x32/0x100 [ 447.909974][ T4240] ? __kasan_kmalloc+0x9b/0xd0 [ 447.915001][ T4240] btf_new_fd+0x1f27/0x2450 [ 447.919628][ T4240] ? lock_acquire+0x442/0x510 [ 447.924323][ T4240] ? rcu_read_lock_sched_held+0xd/0x70 [ 447.929806][ T4240] ? lock_release+0x522/0x720 [ 447.934503][ T4240] ? btf_type_snprintf_show+0x140/0x140 [ 447.940262][ T4240] ? apparmor_capable+0x1d8/0x460 [ 447.945434][ T4240] ? security_capable+0x8f/0xc0 [ 447.950383][ T4240] __sys_bpf+0x1e4c/0x5410 [ 447.954941][ T4240] ? ksys_write+0x212/0x250 [ 447.959557][ T4240] ? bpf_link_get_from_fd+0x110/0x110 [ 447.965135][ T4240] ? rcu_read_lock_sched_held+0xd/0x70 [ 447.971044][ T4240] ? lock_release+0x522/0x720 [ 447.975896][ T4240] ? fsnotify+0x1050/0x1050 [ 447.980665][ T4240] ? ksys_write+0x12d/0x250 [ 447.985280][ T4240] ? rcu_read_lock_sched_held+0xd/0x70 [ 447.990953][ T4240] ? lock_acquire+0x442/0x510 [ 447.995646][ T4240] ? lock_release+0x522/0x720 [ 448.000429][ T4240] ? trace_hardirqs_on+0x38/0x1c0 [ 448.005464][ T4240] __x64_sys_bpf+0x75/0xb0 [ 448.009890][ T4240] ? syscall_enter_from_user_mode+0x21/0x70 [ 448.016152][ T4240] do_syscall_64+0x35/0xb0 [ 448.020567][ T4240] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 448.027419][ T4240] RIP: 0033:0x4665e9 [ 448.031738][ T4240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 448.053106][ T4240] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 448.061793][ T4240] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 448.069969][ T4240] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 448.078164][ T4240] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 448.086139][ T4240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 09:03:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x39, 0x87, 0x1}, 0x20) [ 448.094128][ T4240] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:14 executing program 1 (fault-call:0 fault-nth:26): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x6c}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x20000001}, 0x20) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x2, {0x1, 0x1, 0x4}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)="c7952368581ceb320d5a5ed98f4602143ffc49306c9a1146704a75fd1aa64ae57fbb624f9c116981b315e0b0c5056190cd9623d66d8e7e589711007d7c5ef96189b67055bf4ca8768ef2e18723174d2089a593698155c267ff369b666b0f2e5791d28ccff81215e6112a8785984089384a1018a278435b5beac5acc19a764c852a89163d1f66e2fc1fb99d08dbefa65b00d73f55f7a91387e2f0ab8c42dc11425bb237953c2e882543c30ec1dfdf3ed94cd94d20b8ea4d40871aa8990a6d791bdf44b5b614657d10", 0xc8}, {&(0x7f0000000200)="53da1585d0de3e14aa", 0x9}, {&(0x7f00000002c0)="96647f6e4d005d13341bfd33b9430d48333a93cdb5165ee1660c339d91dfb61202753532a157cf2cedfa607bc167ac54a726b473fdc98afd14815765cfc51c11a2228d4864e0e7e22b5ce8e5afc88035abf342265bbc85d8d8114cec56", 0x5d}], 0x3, &(0x7f0000000340)="84eeee60d08c454ad95cc4edb0ebe92f2402053a688265fe09e32d3b2fabd0491260f5bbdd9c9d1f23ccaad48c217b5f736128e5363668340f94d5eac4c26308803a1c3f7cfdb4f4fed99d58a116a0c1d9a9f700b669e369ebbdcaacf0a204b4a573e5ea6a2d475338400ea51ae51d98a36034fd0353421f9658b3dc66aac928da78af9d74684c6db4bed2243b18451a8359f216a515559623150a78c0", 0x9d, 0x4000801}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x81, 0x2, 0xfffffffd, 0x10, 0x1, 0x6, '\x00', 0x0, r0, 0x2, 0x5}, 0x40) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x401, 0x6, 0x8001, 0xa4, r1, 0x9, '\x00', 0x0, r2, 0x0, 0x3, 0x4}, 0x40) 09:03:14 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x201}, 0x20) 09:03:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x39, 0x87, 0x1}, 0x20) 09:03:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x0, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x99, 0x87, 0x1}, 0x20) 09:03:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x74}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x1, 0x40, 0x6c, 0x3, 0x0, 0x1, 0x7080, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000200), 0x2}, 0x20, 0x79, 0x6, 0x5, 0xbf67, 0x8, 0x4, 0x0, 0x10001, 0x0, 0xd9bf}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x70, 0x4, 0x2, 0x81, 0x0, 0x40, 0x802e1, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0xf25c, 0x2}, 0x40e80, 0x5, 0x81, 0x4, 0x20, 0x2, 0x81, 0x0, 0x0, 0x0, 0x8}, r1, 0x8, r2, 0x13) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:14 executing program 5: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000040)={0x3, 0x80, 0x22, 0x5, 0x7f, 0xe0, 0x0, 0x3, 0x2420, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000000), 0xd}, 0x40002, 0x3800000000, 0x4d, 0x3, 0x7, 0x2, 0x7f, 0x0, 0xf4, 0x0, 0x8}) [ 448.343567][ T4274] FAULT_INJECTION: forcing a failure. [ 448.343567][ T4274] name fail_usercopy, interval 1, probability 0, space 0, times 0 09:03:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x0, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x99, 0x87, 0x1}, 0x20) [ 448.425376][ T4274] CPU: 0 PID: 4274 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 448.436184][ T4274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.446350][ T4274] Call Trace: [ 448.449815][ T4274] dump_stack_lvl+0xcd/0x134 [ 448.454527][ T4274] should_fail.cold+0x5/0xa [ 448.459514][ T4274] _copy_to_user+0x2c/0x150 [ 448.464078][ T4274] bpf_verifier_vlog+0x1b2/0x2e0 [ 448.469219][ T4274] __btf_verifier_log+0xbb/0xf0 [ 448.474185][ T4274] ? btf_id_cmp_func+0x90/0x90 [ 448.479094][ T4274] ? _copy_to_user+0xdc/0x150 [ 448.483802][ T4274] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 448.490254][ T4274] __btf_verifier_log_type+0x55d/0x8e0 [ 448.495838][ T4274] ? btf_var_show+0x380/0x380 [ 448.500799][ T4274] ? rcu_read_lock_sched_held+0xd/0x70 [ 448.506632][ T4274] ? trace_kmalloc_node+0x32/0x100 [ 448.511773][ T4274] ? __kasan_kmalloc+0x9b/0xd0 [ 448.516667][ T4274] btf_new_fd+0x1f27/0x2450 [ 448.521290][ T4274] ? lock_acquire+0x442/0x510 [ 448.526073][ T4274] ? rcu_read_lock_sched_held+0xd/0x70 [ 448.531568][ T4274] ? lock_release+0x522/0x720 [ 448.536358][ T4274] ? btf_type_snprintf_show+0x140/0x140 [ 448.542289][ T4274] ? apparmor_capable+0x1d8/0x460 [ 448.547774][ T4274] ? security_capable+0x8f/0xc0 [ 448.552736][ T4274] __sys_bpf+0x1e4c/0x5410 [ 448.557187][ T4274] ? ksys_write+0x212/0x250 [ 448.561982][ T4274] ? bpf_link_get_from_fd+0x110/0x110 [ 448.567459][ T4274] ? rcu_read_lock_sched_held+0xd/0x70 [ 448.573204][ T4274] ? lock_release+0x522/0x720 [ 448.577898][ T4274] ? fsnotify+0x1050/0x1050 [ 448.582719][ T4274] ? ksys_write+0x12d/0x250 [ 448.587609][ T4274] ? rcu_read_lock_sched_held+0xd/0x70 [ 448.593366][ T4274] ? lock_acquire+0x442/0x510 [ 448.598099][ T4274] ? lock_release+0x522/0x720 [ 448.602834][ T4274] ? trace_hardirqs_on+0x38/0x1c0 [ 448.607970][ T4274] __x64_sys_bpf+0x75/0xb0 [ 448.612401][ T4274] ? syscall_enter_from_user_mode+0x21/0x70 [ 448.618324][ T4274] do_syscall_64+0x35/0xb0 [ 448.623031][ T4274] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 448.629094][ T4274] RIP: 0033:0x4665e9 [ 448.632998][ T4274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 448.653163][ T4274] RSP: 002b:00007fe0255c7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 448.661594][ T4274] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 448.669765][ T4274] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 448.677833][ T4274] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 448.685817][ T4274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 448.693800][ T4274] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:14 executing program 1 (fault-call:0 fault-nth:27): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x0, 0x7, 0x0, 0x4, 0x1, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x99, 0x87, 0x1}, 0x20) 09:03:14 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180020b3166c0d7813fc0000000000003c0000003c000000040000000300000000000001000000005800110509000000000000020200000006000000000000010000000005003e04060000000000000100000000"], &(0x7f0000000080)=""/252, 0x58, 0xfc}, 0x20) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x85) 09:03:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x7a}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x14) 09:03:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x0, 0x1, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x99, 0x87, 0x1}, 0x20) 09:03:14 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:14 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x81, 0x0, 0xcb, 0x1f, 0x0, 0x30000000000000, 0x5400, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x1, 0x8c, 0x7, 0x9, 0x9a, 0x2, 0x0, 0xb5, 0x0, 0x1}, 0xffffffffffffffff, 0x20008000006, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xff) 09:03:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0xb1}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) [ 448.862233][ T4305] FAULT_INJECTION: forcing a failure. [ 448.862233][ T4305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 448.933972][ T4305] CPU: 0 PID: 4305 Comm: syz-executor.1 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 448.944349][ T4305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.954846][ T4305] Call Trace: [ 448.958214][ T4305] dump_stack_lvl+0xcd/0x134 [ 448.963081][ T4305] should_fail.cold+0x5/0xa [ 448.967686][ T4305] _copy_to_user+0x2c/0x150 [ 448.972277][ T4305] simple_read_from_buffer+0xcc/0x160 [ 448.977743][ T4305] proc_fail_nth_read+0x187/0x220 [ 448.982791][ T4305] ? proc_fault_inject_read+0x220/0x220 [ 448.988512][ T4305] ? security_file_permission+0x248/0x560 [ 448.994508][ T4305] ? proc_fault_inject_read+0x220/0x220 [ 449.000150][ T4305] vfs_read+0x1b5/0x570 [ 449.004583][ T4305] ksys_read+0x12d/0x250 [ 449.009358][ T4305] ? vfs_write+0xa40/0xa40 [ 449.013876][ T4305] ? syscall_enter_from_user_mode+0x21/0x70 [ 449.019874][ T4305] do_syscall_64+0x35/0xb0 [ 449.024306][ T4305] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 449.030312][ T4305] RIP: 0033:0x41936c [ 449.034287][ T4305] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 449.054372][ T4305] RSP: 002b:00007fe0255c7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 449.063332][ T4305] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041936c [ 449.071385][ T4305] RDX: 000000000000000f RSI: 00007fe0255c71e0 RDI: 0000000000000003 [ 449.079601][ T4305] RBP: 00007fe0255c71d0 R08: 0000000000000000 R09: 0000000000000000 [ 449.087591][ T4305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 449.095808][ T4305] R13: 00007ffccce32eef R14: 00007fe0255c7300 R15: 0000000000022000 09:03:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r0, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=""/87, 0x57}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x7ff}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=""/18, 0x12, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x19, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8d7}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x81, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, 0x3, r0, 0x8, &(0x7f0000000100)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x10, 0x5, 0x3}, 0x10, r1}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r0, 0x10, &(0x7f0000000440)={&(0x7f00000003c0)=""/65, 0x41, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0)=r2, 0x4) 09:03:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x7, 0x0, 0x4, 0x0, 0x0, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}, {0x4, 0x4, 0x9}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x99, 0x87, 0x1}, 0x20) 09:03:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0xfffffffffffffffe, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @generic={0x5, 0x2, 0x5, 0x2, 0x7fffffff}, @map_val={0x18, 0xa, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @map={0x18, 0x2, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @generic={0x81, 0x3, 0x1, 0x7ff, 0x3}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x34, &(0x7f0000000100)=""/52, 0x7bae30b06ace090c, 0x8, '\x00', 0x0, 0xc, r0, 0x8, &(0x7f0000000140)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x1, 0x6, 0x8001, 0x80}, 0x10, 0xffffffffffffffff, r1}, 0x78) 09:03:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x2}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x6, 0x0, 0x4, 0x0, 0x0, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}, {0xb, 0x4, 0x3}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x8d, 0x87, 0x1}, 0x20) 09:03:15 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x7fffffff, 0xff, 0x7, 0x10, 0x1, 0x1000, '\x00', 0x0, r0, 0x3, 0x0, 0x5}, 0x40) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc4, 0xc4, 0x5, [@fwd={0x1}, @var={0x10, 0x0, 0x0, 0xe, 0x4, 0x1}, @func={0xf, 0x0, 0x0, 0xc, 0x2}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x34, 0x0, 0x8}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x9}, {0x3, 0x4}, {0x3, 0x4}, {0x1, 0x3}, {0xc, 0x5}, {0x8, 0x5}]}, @volatile={0x4, 0x0, 0x0, 0x9, 0x3}, @enum={0xe, 0x5, 0x0, 0x6, 0x4, [{0xc, 0x6}, {0x5, 0xffffffff}, {0x9, 0x7}, {0xc, 0x7}, {0x4, 0x20}]}, @var={0xc, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x61, 0x30, 0x0]}}, &(0x7f0000000140)=""/75, 0xe1, 0x4b, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1a, 0x40, 0x100, 0x1, 0x1300, r1, 0xffffffff, '\x00', 0x0, r2, 0x5, 0x1, 0x1}, 0x40) 09:03:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000240)}, {&(0x7f00000002c0)=""/160, 0xa0}], 0x2, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0xb0}, 0x42) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r1, 0x10, &(0x7f0000000140)={&(0x7f0000000040)=""/208, 0xd0}}, 0x10) recvmsg(r1, &(0x7f0000004000)={&(0x7f0000003c00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000003c80)=""/205, 0xcd}, {&(0x7f0000003d80)=""/238, 0xee}, {&(0x7f0000003e80)=""/167, 0xa7}], 0x3, &(0x7f0000003f80)=""/112, 0x70}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000004040)={0x6, 0x1, 0xb2ca, 0x3ff, 0x400, 0xffffffffffffffff, 0x9, '\x00', r2, 0xffffffffffffffff, 0x4, 0x4, 0x5}, 0x40) 09:03:15 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x5, 0x0, 0x4, 0x0, 0x0, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}, {0xd, 0x4, 0x66ae7f55}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x81, 0x87, 0x1}, 0x20) 09:03:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x3}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) 09:03:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup, r0, 0x15}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:15 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x54, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x4, 0x0, 0x4, 0x0, 0x0, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}, {0x10, 0x1, 0x3ff}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x75, 0x87, 0x1}, 0x20) 09:03:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x4}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, [@generic={0x8, 0xe, 0x7, 0xdb, 0x9}]}, &(0x7f0000000040)='GPL\x00', 0x71, 0x7d, &(0x7f0000000080)=""/125, 0x40f00, 0x1, '\x00', 0x0, 0x8, r0, 0x8, &(0x7f0000000100)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x5, 0x7, 0x240, 0x5f}, 0x10}, 0x78) 09:03:15 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) 09:03:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x3, 0x0, 0x4, 0x0, 0x0, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}, {0x2, 0x4, 0x4}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x69, 0x87, 0x1}, 0x20) 09:03:15 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x1, 0xffffff01, 0xc75, 0x80, 0x1, 0xff, '\x00', 0x0, r0, 0x5, 0x3, 0x2}, 0x40) 09:03:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x5}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x4, 0x1, 0x7ff}, {0x3, 0x4}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x5d, 0x87, 0x1}, 0x20) 09:03:15 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0, 0xfffffeee, 0x0, 0x1}, 0xffffff6a) 09:03:15 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r1, 0x7, 0x10}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f00000002c0)=""/82, 0x52}, {&(0x7f0000000340)=""/220, 0xdc}, {&(0x7f0000000440)=""/218, 0xda}, {&(0x7f0000000540)=""/236, 0xec}, {&(0x7f0000000640)=""/215, 0xd7}, {&(0x7f0000000240)=""/61, 0x3d}, {&(0x7f0000000740)=""/65, 0x41}], 0x8, &(0x7f0000000840)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x90}, 0x40000000) 09:03:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x6}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4, 0x1, 0x7ff}]}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x51, 0x87, 0x1}, 0x20) 09:03:16 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x20) r0 = socket$kcm(0x29, 0xf, 0x0) sendmsg(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)="65be691ddc8d782a6b1b74d8666a649481e964984f8cc76082632caef9598d37cd4742d1c34209aa11f25910209b6441783dd6c15eb5614db6870079c62f79a5019832e255e77b504d1cdb05cfe6ed1fc1f93399195375f5557694d925deb456474e279f3c52725232e8523567cc943f3e56c75e9b89008307ee96fdf59881d79ed9c966f519e33629ddee3294ac2ccd6b3ab89bcf9b46", 0x97}, {&(0x7f0000000100)="b4443962e9b3c980249a7fd0d527ad6e555e5b491f414f169ef78c3e09fa193a87f4396973f246f03551e398a60bc6f9b90f0c2232afb19cf0c34ab65026f12f82b9b3c7c2b45b99350839a671840710c37d3a66778066c483d0841ed3e7daf5af52e6f007b8a59ff4c889af1c114f2ba396c5cccb85f4fdafd3fd4e8e380f0e10f46bd9d38e68e51cdf189fe562c44c2c97b56436c85765961e27ccc9d5672cc9c4e839ca36455c6e456b62f2c94c21f6", 0xb1}, {&(0x7f00000001c0)="9ebc759851f3861f65f1f87e44d212f4fa963c325b7835d5652493af42a53e95e2a2618c7824dce4e6fd2f34fee977bad2e50bedba73", 0x36}, {&(0x7f0000000200)="5d92e5ce0c4a251de33f16abf927012a565f4d1edc85284191857d558e678d89cc71b71cd692956032", 0x29}, {&(0x7f0000000240)="7337ff0dd67d6b7e5f84b3ab627c706cda0bebf08385758f7f61b2f0", 0x1c}, {&(0x7f0000000280)="e904525d6371c014189b36ffe86d8e76f3dd4d834541ba72a4fdf144a16974fe46e8cf2726d9d1909de3b965e8cfc3de86465cd3fa5e48fb1b2dd37e83c74006748cf09d8c6a41f939a41f6b2522771058a9bfff7cebc46c4a70d7192d42937e7a20e463a0446105ea73150d0ae381221142", 0x72}, {&(0x7f0000000300)="10a898dae7a75740a6349df5e2501be8d04651b266a887cd037adeb62e80fe49d10c6d56aa3c76887c80a0cbaa04fd35e788c05d3cfecbcdb0eaa45d3b67e58ef7ef88451f84dbfc4b22e2af182820dae0e5925f943bc4ca1e7c72f801e1a25278723a52eec37247028ab8166fe1dc83de42069042b446eca780526b59c6aa523fbfcfa1e52c18f3eab943ce", 0x8c}], 0x7, &(0x7f0000000440)=[{0xa0, 0x116, 0x3, "e2bad8df1d35938d4eae47ac4862cc53a74712c37994f02bf26eb7de5fdaf86aea9898c6b9a44fd44826eff92cd9a637e561d6138566cd1499d0ef54964671c9b87557582497a85264fa0846c7521bd7bf68d3a2600f256d1a4625fe3799ce89dbc986b4c755e7a855248224da8c8d71a804f39561a839660657eac1d8ae10e64529657f926d2c37fceae87832730c"}, {0xf0, 0x107, 0x7, "1d61c1831005f1619c80e44ae960f933b55713a03593241580c2840830baf624b84d2e584e1141a791281a7b1bea2701dbbcaecad98140b7ce657f2046934af6b70d65e2be098335e6304c444701168d85abcfd797e94d33f977473daca88174bdb818a0fefefed774b68d958d6901dd4027beaa35c6c9a58db4ffe1488cf3da6d8bccd489f352d1fdd67950026062e20f454974bf0c2336060cd0c5c67bcc3fc68573add83b23a7523ce1fe75e9528a28505107874e623ba179a9b5880869677c963f45afbfaa4eb2452126a650e0e0bf441643d803428722b155dbed2fb838"}, {0x60, 0x112, 0x5, "4f685c0681622185bd405b7650ecbab5561c1ed76d30358e07e4589684d259d371b3f9f9fbc52a8d39dbb152986fdbbd6547eb2ec1fe1d286d20ab19144726c398d69441638efea0f585"}, {0x100, 0x88, 0x1, "3178b441643698ddfb1e6dfde67e6a18a0b84d624adb6b3b8924009135497a2f89d7ebc2aa9aa547d3f29034de2ccba3980abadc3df39c4921e1868ddfae706d4e943cd462837553433c9e8f95a233c1ff2e2d5c4f3f1c8c7e0ae76db856d3e1a3687351f99060668d75a15fd37b18063a9ce0acb28ca0c3f566765b9fed6e6e5b6efeae68349116301d148197df49155718ae28dea1120366f16075beb617d1434f979da4f13b43eddb20e86bfa2ac177df27ec341531fa42b22643cfb53670a05152761c03b1252ec54312daedc5713c68397b5559ff2f55eca6fc3481d8671342eb29c5d3a93a2d62f6"}, {0xc0, 0x1, 0x80000000, "1dc1193bbc24410ffb47bb79bf78a4957f3a6f441c06e6629be71b602c74d7435ade25d0217af5b5c3f8be1a0fe65ae15c9c25a5e5db1fa973623e2fff62df2eca5d53b4143c0ee7c1c75157e8358c05def1b209a108fa98976e2a50eb9f3c04b50a11a11db0dc367eb7b63b923e0e48a0c1643b34b1ff57ea6f291442299079ae9986ede99c7f23997af854f94cb18a9f9a691d03f12c56704b9b96bc589dfb5abbbed21362df6b3df0c5a47bfd"}, {0x28, 0xff, 0x1, "79b35294e01163fd5f79f3e7f0ae3175f7013e649b9a0d"}, {0x98, 0x104, 0x4, "fbc9a1a47da3521461d03fedc862f62ed8b8fe78c10518a97e0731c722dad1b947d387026c9ed6ecc24f144b6b72eae8cd77eebdccc556fe6df1638a248147915d684036ffd31ae56bf5259b3824bed0cb1daa6710cc6dc72d38f842d474eeb189234b53ea97ac7acc78e30a2dc74d6b7280669d1f0ef8431183174dead14f4a50c6f14c6ecf814b"}, {0x38, 0x101, 0x7, "6cb421371900d3780e879b1af5d6360519856ea949d1c4c2f5717d2c2ee1c15aebbe"}, {0xe0, 0x0, 0x3, "156823bba435d592ece9fbac8021f6fdb26199a504886ff93fcdf13e965a4d67b695a06b6b1d21f3ba1af4126fbcd17f3199a1bbe226a38d7072ca8bd41b53ba6cc637b093e2ea16273bd046bb18f08ef5b0b3faf7f9770ad80eb983317551d6cd12784e4786e1dd1ad3097f9bdf7df07e39ab1508df702bf3a8e1c4c7e2377f46963361c7f56423d2fdbf99b1943432405af2e8e3afde5d3ab1f849abaf070088fd96fa38059900c110fcc2b4d3342cc3addc02f4744c112694d2dadcc20867c55c5bd151f3c26997cd2c"}], 0x588}, 0x44) 09:03:16 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) socketpair(0x2, 0x6, 0x10001, &(0x7f00000002c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11f, 0x11f, 0x5, [@datasec={0x7, 0x6, 0x0, 0xf, 0x3, [{0x1, 0x8}, {0x2, 0x1, 0x2}, {0x2, 0xcc, 0x101}, {0x1, 0x4, 0xffffffc0}, {0x3, 0x1ff, 0x20}, {0x4, 0x3, 0x2}], "3bc4e3"}, @fwd={0x8}, @struct={0x7, 0x8, 0x0, 0x4, 0x0, 0x7fff, [{0x5, 0x3, 0x101}, {0xd, 0x3, 0x7}, {0x1, 0x3}, {0x0, 0x5, 0x7}, {0x4, 0x0, 0x5}, {0x5, 0x4, 0x9}, {0x1, 0x1, 0x70b3}, {0x1, 0x0, 0x2}]}, @ptr={0xe, 0x0, 0x0, 0x2, 0x5}, @enum={0xf, 0x7, 0x0, 0x6, 0x4, [{0x5, 0x9}, {0x9}, {0xb, 0x3f}, {0x8, 0x3}, {0xc, 0x80000001}, {0x4, 0x7cf7}, {0xd, 0x5}]}]}, {0x0, [0x5f, 0x61, 0x61]}}, &(0x7f0000000140)=""/219, 0x13d, 0xdb}, 0x20) 09:03:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x7}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="8c6492f825a499897c51deed945014ffdf4f06e6f76aa7d190279f911ff1594e9d0b9835a0553ef8dafd2aeb0cfb1d0b1ef2c8ec5f89c2fff84af908cf55740e354482fc503878fe44ec135821a6b0600203bab677abf0827f898310e4f669cd1ee9216412c204ef3a9060b2a8e8db37c8b2da6bb0d91ce2ba4c20ff958eb5cfa7d46975410488b3b6384f6813eb01df46ae38dde362b943b095b35f679cbf828ef0075bb8afd3e6b0bc8d35a02c90fe302351612e9f9c7677dfe3edb185535c008dc55919eb9dd0627f2c6eb2377e5a05d9b97acae69a5707956624d67b76b9", 0xe0}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x650}, 0x44) 09:03:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0xb1, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5, 0x200}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x45, 0x87, 0x1}, 0x20) 09:03:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x8}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x23, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x1, 0x8, 0xa, 0x4, 0x2c, 0xfffffffffffffffc}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0xc, 0x6, 0xb, 0xc, 0xfffffffffffffffc}, @ldst={0x1, 0x2, 0x1, 0xa, 0xb, 0xffffffffffffffe0, 0x10}]}, &(0x7f0000000040)='syzkaller\x00', 0x800, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000080)={0x9, 0x2}, 0x8, 0x10, &(0x7f00000000c0)={0x3, 0x6, 0x4, 0x869}, 0x10}, 0x78) 09:03:16 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000024c0)={&(0x7f0000000140), 0x6e, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/73, 0x49}, {&(0x7f00000012c0)=""/177, 0xb1}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/168, 0xa8}], 0x4, &(0x7f0000002440)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="008000003800"/20, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x60}, 0x40002002) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000002940), 0x8) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000002980)=r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000002500)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000002540)={r5}) sendmsg$inet(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000040)="267390e9a046be439f2236d38e32521bd63be570a6e1f1a878b9405f400d8d361d4547f9475fca28229d5353913afb6db65a2ffa82cd8bb5e0a5bf23e147", 0x3e}], 0x2, &(0x7f00000000c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7fff}}], 0x30}, 0x8002) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002a00)={&(0x7f00000029c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002dc0)={0xffffffffffffffff, 0xc0, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002bc0)=0x7fffffff, 0x0, 0x0, 0x0, &(0x7f0000002c00)={0x6, 0x4}, 0x0, 0x0, &(0x7f0000002c40)={0x1, 0xb, 0x4, 0x2}, &(0x7f0000002c80)=0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=0x6}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002e00)=@bpf_lsm={0x1d, 0x4, &(0x7f0000002a40)=@raw=[@alu={0x7, 0x0, 0x4, 0x9, 0x0, 0xfffffffffffffff0, 0x8}, @jmp={0x5, 0x1, 0x8, 0xa, 0x6, 0x0, 0x4}, @map={0x18, 0x9, 0x1, 0x0, r6}], &(0x7f0000002a80)='GPL\x00', 0x401, 0x49, &(0x7f0000002ac0)=""/73, 0x41000, 0x4, '\x00', 0x0, 0x1b, r4, 0x8, &(0x7f0000002b40)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002b80)={0x1, 0x6, 0x1, 0x6b15}, 0x10, r7}, 0x78) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(r2, &(0x7f0000002900)={&(0x7f0000002580)=@ll={0x11, 0x1, 0x0, 0x1, 0x6, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x40}}, 0x80, &(0x7f0000002800)=[{&(0x7f0000002600)="105f4a3ff32ababd7283dbeff56c5e2ae00f985f4d872c3d39c51139d82719f62382372768451c89db98b6e7e908", 0x2e}, {&(0x7f0000002640)="430e9fa2d23eecaca9f6eceb03c8270ea6a96fd64c9197062fd178732865ee250579ec8bc689cf0c18c79c9abf60e3f225b4e146129b48ea3b52d70aa4aa029de751be0b15beda83ba0e163704d63866c448429e3647b4bb687e7c536329062050345b3e6c7b48184baf756fa76267c94469ef6182fe33f355b9", 0x7a}, {&(0x7f00000026c0)="afeb65ec136f70bb951d1165fc58ede47abd4c225fe6fc09a505663a621ec748cf28f73b71bf789e7875fa7ad4dff1b64df4d46a7305c2274fa0f237101d8c72eab1df6cf03c4b7d311f759a8443c066019efdc5d05dc45902c34488753f307c9d6dcdf89dd474ddc96025b109a247e7185e5db34624fb44065fc586f638663f13a8a6b6a831875f65ff5150f458671f0676c6e0a1ad51e0b1f7d84a61e7cdb5d7fe31707795512ee3c836211b2805d1cbef283ed7275e4204358da48c2d2502a4bd55b9ef7c8159c0a31183f73c4af3fb3c", 0xd2}, {&(0x7f00000027c0)="172d81897056c83c585ba643fdacf7ade8895c79e6d6f13c0cafa67e004106c1da3d3015f40259aaef83fddd80ac103eb14f2caa20d046a94a60b14066", 0x3d}], 0x4, &(0x7f0000002840)=[{0xb0, 0x107, 0x5, "cd1c91e1e66acc0d0ed12f6ec9a6b10083abe357c6d802c0feb4bdc41083d5c867ad09e9fb3802946049b73674e57266124f9b0aa38a7c4ff44f7b7289cf098207aa0d17d79b22a63bf422c489401ffb8846b8037219872c3e9766a82bffa7e6c6613fb4d061624286bdd9e92e3c9df9e7e623feb105d9313e0a11d0af1b2af61a1ef40a6e1477b5d6d39ebc4c04e51b84e3e75e7baf6bc00beb554c111010"}], 0xb0}, 0x44000) 09:03:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0xa}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)=0x1) 09:03:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x2d, 0x87, 0x1}, 0x20) 09:03:16 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0xc}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000040)={0x0, 0x0, 0x4f, 0x0, 0x1}, 0x20) 09:03:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x2d, 0x87, 0x1}, 0x20) 09:03:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000680)=[{&(0x7f00000002c0)="bbf63d597eb07337139f474502939f5302ed0f9e2369c85e48d21e9d7b58760220173f86da788cbbefcd57b939f9862473bb86a8a2c196f4319a26fd79b28737a366a3a99f48f2df364e2dbad4231cccbb416e1236fa25a2757b4b964913ea16be7a664f3e746f10918600ce4eadff4cd2aef8d254c585a497c963ee38e385d84eecf8953510b6cd27d8", 0x8a}, {&(0x7f0000000380)="4a6b1f74471e4661b2e82c00a5f3314d01f863cd04f32511390a386de3ee9f922875bcda78e1355a0c023dd68ac754955ca0c52ede77c9d8e7781bf9fec8c4c581edc72ed54bb725348b67d21bd5c02a73cadb958711996562417b7e864f8c1d81278d52e8f7b515bf", 0x69}, {&(0x7f0000000400)="00434f573a2cb8f431de280f5cb43c1397e7396a13138a0bef588675815b185591fc81e124828f45", 0x28}, {&(0x7f0000000440)="dbcf78939df2529c986c0637ca2e00c164f0efe470cb1386bc794f626dbb0eb34163fc16156a2f6ca163937e7f0871ec56e237f5c2e627190dd08e11713b3c5c64bbc43bde3e2499330637aed934196e744a331ec61c3595ad90d89d7d657faf366c71d8855c653c7be8715698d0a0e4ddeddec5e6ac42c936288ca5b637af364de85f304e18e1ea88b2bf78947a10e0624ed2e3cc42afa49f680d74dd0796ecca8357a7f322275077a621502ee106b2ee379d96a74bd91b15271bc95a5da30094dc4aa22ae026afd6b3a3cc91e2a3e5ed7b890b9e57190549c561c06ce352362b7aa45f0ef001cb76fa418d1f32ff952a5cacc8df17d8", 0xf7}, {&(0x7f0000000540)="457a501a714f8f547ae317594a2271a7b40fd183d4dbeeb2", 0x18}, {&(0x7f0000000580)="7f195c6239e34a2f3f89d3f6638dc3c746656b11585fb135c0be3d5393d085f5e1cd3decd2ee4f75bd61ef9dc9194a950a2c2aacac2491fe80da5fc52c1a0c0efcdca0f2aa0957c519baf4e6010523eb1dd66f8e33b54c59030d2271cc60a373ac5adeee021f14bc3c793f2ccfcd1414136617ed52f447e72549e631738bd5ac99af2bfe73c97df3fbc94e54d15e6469cc10fd519eb5df22d5daebb14f27ef7056106033fc", 0xa5}, {&(0x7f0000000640)="27773bc2a404c46f12e643668146901078a404b27d084b471e1174b1ce1670d08408b51ef8b4f7ee8df7ac2dbf813b384e19ac422db77bead545962717", 0x3d}], 0x7, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20, 0x4008}, 0xc0) r2 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0}, 0xffffffffffffffe3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r3, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, 0x0, 0x2, 0x0) openat$cgroup(r4, &(0x7f0000000c00)='syz1\x00', 0x200002, 0x0) sendmsg$sock(r3, &(0x7f0000000bc0)={&(0x7f0000000780)=@l2={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000800)="978be62624149bdae5e9f6ce88677efeeda14964c02dd33f71a1f6040f07d63e7d893e9ce986b2b92c4ab044d2c7bc30a4bf49d613e2fa2b23f7853c2f949f460ff3c8432c85d6e4af092aad72fc5ef8b92e110f5c05d61b953bb9fe0cd2f982221dd6adf8fe4e5b0df44f1d990a80246266e46091d07e2d0edac0be05e995b9fe9ef2d9dfebf8c88b736a6148dcbd52bd17623a227c50b2a0a899478b67a8a9116cc840f0c2de381cc95a9e926b", 0xae}, {&(0x7f00000008c0)="4cb870aace680283d2c382404c780fba153fb3d363b17e54984bd9d0aa40fc9527c865debecd248f5ec9f8bd2d215488dfc086e46237061e2862c87dd83dc0e174817b9e7472afa023ecb8486963d7e4c77af0cc00ac19dcfa156e6280202248680e57c0d2d0f0459ad53e5d544a44a4f8839f579a85ae20766f26d60664555c4422794a4320da20066abc5234ae1ab3ec9906d9d148eb9d4884c0ca16500c475f3366ef08c72cf39ffa6e240833b1bcb00bc9d6f85e7dd017c922b81c26b39e5a41cd6476fc2524d663b057a62d91cb43cb5d47ecc0928215e8b1ac3f8f4ae8b8db542e253843", 0xe7}, {&(0x7f00000009c0)="347b9f10da0da94abac4687eff23fa6054ff307e71571dfadc1e9af4b61c473c6757f61d50b3362f328bafd4a89cd191022d19e4adffa219aa72febd8ed37badc853532d732e357499187f39b9818d814250f5f5a40eae9663727cbb0f9b946893d346232406836269b57a5b544bea5b24041d5b6e61d05f11bca25bef6977808b95d9b928d17690287f1f8b2202558dd2dad03316d9e30c36da6750f7c0527b9a4fe6ca04abeb059e", 0xa9}, {&(0x7f0000000a80)="4611d510c633da6a0e2c6571347bdaf047511b67f3ceddc4e7972d86587b8ae3ad16e96e83d6a20620520514ccf7aa38", 0x30}], 0x4, &(0x7f0000000b00)=[@timestamping={{0x14, 0x1, 0x25, 0x5}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0xff}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}], 0x90}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x9, &(0x7f0000000cc0)=ANY=[@ANYBLOB="950000000000000018000000860c00000000000001f0ffff850000005100000018340000010000000000000000000000850000003a00000018330000050000000000000000000000ceaf2a57ab725994b5ebb3"], &(0x7f0000000080)='syzkaller\x00', 0x32e, 0x2a, &(0x7f00000000c0)=""/42, 0x41000, 0x1b, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000100)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x0, 0x5, 0x7af}, 0x10}, 0x78) 09:03:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0xe}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x20) 09:03:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x2d, 0x87, 0x1}, 0x20) 09:03:17 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f000000b640)={&(0x7f000000b480)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000b600)=[{&(0x7f000000b500)=""/238, 0xee}], 0x1}, 0x1) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000200)=""/76, 0x4c}, {&(0x7f00000002c0)=""/169, 0xa9}, {&(0x7f0000000380)=""/186, 0xba}], 0x3, &(0x7f0000000480)=""/143, 0x8f}, 0x141) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000b700)={0x18, 0x4, &(0x7f0000000000)=@raw=[@map={0x18, 0x1}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x6}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x90, &(0x7f0000000080)=""/144, 0x41100, 0x18, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000b680)={0x1, 0x5}, 0x8, 0x10, &(0x7f000000b6c0)={0x0, 0x5, 0x9}, 0x10}, 0x78) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x10}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x5, 0x200}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x45, 0x87, 0x1}, 0x20) 09:03:17 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x48}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x63, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$LINK_DETACH(0x22, &(0x7f0000000000), 0x4) 09:03:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x4c}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x68}, 0x20) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000040)=""/101) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000002c0)) recvmsg$kcm(r1, &(0x7f0000001e00)={&(0x7f0000001940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001d00)=[{&(0x7f00000019c0)=""/215, 0xd7}, {&(0x7f0000001ac0)=""/112, 0x70}, {&(0x7f0000001b40)=""/201, 0xc9}, {&(0x7f0000001c40)=""/164, 0xa4}], 0x4, &(0x7f0000001d40)=""/163, 0xa3}, 0x2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001ec0)=@bpf_ext={0x1c, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="85100000fdffffff18260000", @ANYRES32, @ANYBLOB="0000000005004d5c"], &(0x7f00000001c0)='syzkaller\x00', 0xfffffffc, 0x8a, &(0x7f0000000200)=""/138, 0x41100, 0xf, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001e40)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000001e80)={0x5, 0x4, 0x0, 0x56}, 0x10, 0x1c621, r1}, 0x78) 09:03:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x5, 0x200}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x45, 0x87, 0x1}, 0x20) 09:03:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 1: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@nfc={0x27, 0x0, 0x0, 0x1}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="a6192c2ef8908de4d006a3471e698b159c6bfdeed214e0e19426e3e62dd7a86cec2855cefe27818cf61c7bb1fe1810564ebd90b2c9d91406c07b14a3235806bf3feb374c71a8323447b0ec2abf56213785486eb9516ee6646b548ba7211572cf9048f75bcdd99096a000e431b847d69fcebfca9fb4c5501bd53fd418520640e4c3d6e2ec0ea43bfa4aea", 0x8a}], 0x1, &(0x7f00000001c0)=[{0x88, 0x104, 0x2, "fa7bcb94cf352faf7686ef093a1296d50b4a631a6c45c554a8e805e6a3b341df98ca80d3a4c5aff40bfa6f5435f0bb40b7e99c1f2a345127ec02aef571b88a343832f5993a61b2859f83135a063011f21b0e6716d0ad23d76ad6093740669004b2e6b8edf04ab5c1dd64e70b10144c6929"}], 0x88}, 0x80081) socketpair(0x5, 0x4, 0x8000, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000500)={&(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)=""/56, 0x38}, {&(0x7f0000000400)=""/93, 0x5d}], 0x2, &(0x7f00000004c0)=""/11, 0xb}, 0x2001) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x63}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x40, 0x8, 0x2, 0x80, 0xffffffffffffffff, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 09:03:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x5, 0x200}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x45, 0x87, 0x1}, 0x20) 09:03:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x68}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x200}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x45, 0x87, 0x1}, 0x20) 09:03:17 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000001480)={&(0x7f0000000000)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(rfc7539(xts-aes-neon,sha3-224-generic))\x00'}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)="355df6e753dc5be87fa5690b21f4d43475e057012595ae00b02343826874688774168bd77e5afc70f1a4c281a6e2e1aef54194e4902b744966eea01369cdc4d82d2905f5a3cd877a3c88d68d884669b15b008bc458e95fd4b77c3cb83339020af47908d3611a3d47f1781bafa674797fb4cf7d1de12dfd3192e9575bddeb4023c1fd0e4ffd03b64283a98c39e8602e584e75f77d", 0x94}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000140)="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", 0xfe}, {&(0x7f0000000240)="966745938a83a7a812a7", 0xa}, {&(0x7f00000012c0)="adf1f1a66d486f2f891fe24c1b7973a93a534747fa00e7344f26e37759588ab167369e9f43aa816b3f1074d29491fa41c9bbba56f13c8ecba6b821ee4c3932ec1d1685232d2a88f4146450bc206245a4f738023331f9bdeddd80574e194109f843ac71a96928ae649bc042ac29f2eb00f05b66d6", 0x74}], 0x5, &(0x7f00000013c0)=[{0xb8, 0x108, 0x81, "2bb451189ac812f32c38dde287dc2936acf21d8f14335787a2930f1d5f6e93f78d1cd78d2cb87110d571c02a0e60e79d7f45e1664996b59f560c2ed08a72bb4fd18fc4b86f6a8d60d8d460728e73fb1088e8740c3c65aa72db92f3ab9fe8e503cbf80f9cf33ad191583d7971344688c0fa90356c878c4dff7988528f1c6d506362fa0c1133ce899b04ed33fdffd666616d993585b4c6a0e2b1f8da7edf5c61b8d607f8fb"}], 0xb8}, 0x8000) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000016c0)={0xffffffffffffffff, 0xc0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000014c0), 0x0, 0x0, 0x0, &(0x7f0000001500)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000001540)={0x5, 0x9, 0x7, 0x7fff}, &(0x7f0000001580)=0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=0x5}}, 0x10) 09:03:17 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socket$kcm(0x29, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x6c}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x200}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x45, 0x87, 0x1}, 0x20) 09:03:17 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@map=0x1, 0xffffffffffffffff, 0xc}, 0x10) 09:03:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x0, 0x200}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x45, 0x87, 0x1}, 0x20) 09:03:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000009100)={&(0x7f0000000040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000090c0)}, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000380), 0x6e, &(0x7f0000000640)=[{&(0x7f0000000400)=""/194, 0xc2}, {&(0x7f0000000500)=""/100, 0x64}, {&(0x7f0000000580)=""/155, 0x9b}], 0x3, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0}, 0x43) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x2000, &(0x7f0000000780)={[{@mode={'mode', 0x3d, 0x3}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@euid_eq={'euid', 0x3d, r2}}, {@seclabel}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}]}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000009140)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000009200)=@bpf_ext={0x1c, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ff00000000000000010001001831000003000000000000000000000085000000100000001800000003000000000000003f00000018210000", @ANYRES32=r0, @ANYBLOB="0082000000000000000000803e237d087de0573c90e57fccd42305475ca5b9", @ANYRES32, @ANYBLOB="000000000400000085100000060000008da80100ffffffff9500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x9d59, 0xc4, &(0x7f0000000100)=""/196, 0x41000, 0x0, '\x00', r1, 0x0, r3, 0x8, &(0x7f0000009180)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000091c0)={0x4, 0xd, 0xa870, 0x552}, 0x10, 0x26fb7}, 0x78) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:17 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x74}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f, 0x0]}}, &(0x7f0000000140)=""/135, 0x45, 0x87, 0x1}, 0x20) 09:03:17 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008e40)={&(0x7f0000006740)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000008cc0)=[{&(0x7f00000067c0)=""/201, 0xc9}, {&(0x7f00000068c0)=""/235, 0xeb}, {&(0x7f00000069c0)=""/4096, 0x1000}, {&(0x7f00000079c0)=""/138, 0x8a}, {&(0x7f0000007a80)=""/83, 0x53}, {&(0x7f0000007b00)=""/195, 0xc3}, {&(0x7f0000007c00)=""/101, 0x65}, {&(0x7f0000007c80)=""/17, 0x11}, {&(0x7f0000007cc0)=""/4096, 0x1000}], 0x9, &(0x7f0000008d80)=""/132, 0x84}, 0x63) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) sendmsg$sock(r1, &(0x7f0000002900)={&(0x7f00000002c0)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e20, 0x2}}, 0x80, &(0x7f00000027c0)=[{&(0x7f0000000340)="2e3f1adb28fcefeebc0d926243a1f7c9a0f164438b5cc785d6152ab30c7fb0a0ab3ceb1b131d2f1e55dc27033f4f468abdb5ca4302f3e576181625904bd5699a68ddb255366e5f5b50ef06c07cac202d547093309fbdb3ea510ee8f5a4e0a0e5e3ed6895443afb41ee075cad9c12ee8fcc947321380cae0ddc4d03456a63d0f56fff91923699c03beece744a4ba9f25eb945ead82976529ee6936de5106f68ecc1296e00f166062d617abcc4b2009827d1b9ff8e3dc5ac9d44ca489e8ca979a83da5b6ef660fd5447068e51fd6151f8df5383ec25f4d2627", 0xd8}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000240)="18a5e54ac427fe3ed8c43b7cab7028abed4caa3fc9ea0b6c026a921f246a3202790694da52cac6a5d0", 0x29}, {&(0x7f0000001440)="3bce215dfed8b0c60be674c3d4f7fb97661bfd00fc64952259fbf0b8828c661c467d094d6491a2fc7b581af02d92bdcd612fab1aed9db7726b7ba414b920b3f90317d7f6db40f1fa82790db62819e6f7390b", 0x52}, {&(0x7f00000014c0)="1efbf8f7248058b4f55c668d050df2df52b6fedf98d7e2cb712fdbdc90fe0e1ea13e292918a6f32356fc872dccc188808603815ca1f03f132d5518bc679fd406b9f8322c114c19489ea6c66d09a8f081433f6e0fa335a65e87", 0x59}, {&(0x7f0000001540)="72a8f1b5bd1f82660ba2291c09a6a7ee480a5a06004ef844606b0d35306a458ab30cffe6c4a5b5ad05436b67740346e8601a6a8f5d700aa0449e59a15a3c91e10601d4f676af436381d1066bb9cdcb9f2a48c892175213944e5162c2389908ac279f93d385a092fa45008d8a3437e1c8a2483778ba06661b64476649d6cabff236ecee584c1780a27b78e9a80314f4ef6bbe9e7a531c8d6027a45fb19479057860708cd91ac97bb491490d8b49b1c9d29c8b937abcc2049febd2362dab8c7faea076db2e43d2337bdc3cf1ec843feb6cefc0d9e4b395d4bf87c88a117f52503f64229421244e3bbf472208", 0xeb}, {&(0x7f0000001640)="930a60bf1366b5164133471a6fa2f2204bf83129b6f58f2f24c20562890e36a31a2747fb84dfbcd43995b2e15a391195c1046efc439e629b2bf318ec083a27b47ed63482daea63a814277e7d136ab9a98044a6964b", 0x55}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000026c0)="6ae218b998f04d9c85f992f83188fc049c0c362657b71204624e02ec22a83678bd2868f8b16cf324cceccb5ec87f6c1d39b321e2531caf60045112b85938220e49936a087becf8312a961a432c2a88677d43a195bed34522276963b36c0e54385ecabfc9f55feb8e841c1db37fadbfcac3eadb4505e0e4a5f34c68860a677f1af9476d2e6f05b1f62b3fd2b2ffdd19460cc77492b2c703dfd4996934a1f5bc886a8f1a84", 0xa4}, {&(0x7f0000002780)="f00c9e748a76815d10c460b131575f80018bf093a3519f53", 0x18}], 0xa, &(0x7f0000002880)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x4ec9}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}], 0x78}, 0x4000042) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x4, &(0x7f0000002940)=ANY=[@ANYBLOB="180000000000c71489000000b00085100000fd1c9300"/34], &(0x7f0000000040)='GPL\x00', 0x100, 0x98, &(0x7f0000000080)=""/152, 0x41100, 0x1f, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0xfffffffc, 0x2, 0x5, 0x6}, 0x10}, 0x78) 09:03:17 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x7, 0x0) r4 = getpid() socketpair(0x23, 0x2, 0x19e, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r5}) r6 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="38f14000feffffff851000000800001018170000", @ANYRES32=0x1, @ANYBLOB="000000000000000005515000fcffffff850000006800000085100000faffffff"], &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x56, &(0x7f0000000300)=""/86, 0x41100, 0x5, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x2, 0x7fffffff, 0x3}, 0x10}, 0x78) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r8, 0x0, 0x2, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1f}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000580)='syzkaller\x00', 0x31dc, 0x4a, &(0x7f00000005c0)=""/74, 0x40f00, 0xa, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000640)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x10, 0x9aa9, 0x7}, 0x10}, 0x78) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) sendmsg$unix(r1, &(0x7f00000019c0)={&(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000000e40)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xee00}}}, @rights={{0x30, 0x1, 0x1, [r6, r7, r8, r9, r10, 0xffffffffffffffff, r2, 0xffffffffffffffff]}}], 0x50}, 0x0) r11 = perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x20, 0x6, 0xfe, 0x1, 0x0, 0xfffffffffffffe01, 0x4085, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0xfffffffffffffff7}, 0x2000, 0x9, 0x2, 0x3, 0x40, 0x3, 0x6, 0x0, 0xffffffff, 0x0, 0x1}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r13 = getpid() sendmsg$unix(r12, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r13, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x4e, 0xff, 0x3, 0x58, 0x0, 0x0, 0x143a2, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x7, 0x9ea}, 0x7ab41f2d3907c9e, 0x137, 0x20, 0x3, 0x2, 0x401, 0x5, 0x0, 0x5, 0x0, 0x101}, r13, 0xa, r11, 0x0) close(r11) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r4, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000000)='%\')[]\\)\x18*\xd9-\\.%^%%$!]$$.\x82^\x00'}, 0x30) 09:03:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0x7a}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61, 0x5f]}}, &(0x7f0000000140)=""/135, 0x44, 0x87, 0x1}, 0x20) 09:03:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}, {0x0, [], 0xb1}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x9}, 0x20) r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x5, 0x81, 0x5, 0x0, 0x7, 0xaa000, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfb6a, 0x4, @perf_config_ext={0xcd48, 0x2}, 0x400, 0xff, 0x7, 0x4, 0xffff0000000000, 0x401}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) 09:03:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e, 0x61]}}, &(0x7f0000000140)=""/135, 0x43, 0x87, 0x1}, 0x20) 09:03:18 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x7, 0xb2, 0x1}, 0x20) 09:03:18 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x18}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0xc) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000080)={0x0, 0x0, 0x63, 0x0, 0x3}, 0x20) 09:03:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x2e]}}, &(0x7f0000000140)=""/135, 0x42, 0x87, 0x1}, 0x20) 09:03:18 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000009d40)={&(0x7f00000079c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009c00)=[{&(0x7f0000007a40)=""/60, 0x3c}, {&(0x7f0000007a80)=""/4096, 0x1000}, {&(0x7f0000008a80)=""/141, 0x8d}, {&(0x7f0000008b40)=""/171, 0xab}, {&(0x7f0000008c00)=""/4096, 0x1000}], 0x5, &(0x7f0000009c80)=""/163, 0xa3}, 0x100) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000009e00)=@bpf_ext={0x1c, 0x5, &(0x7f0000000000)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2d}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], &(0x7f0000000040)='syzkaller\x00', 0x10000000, 0xcf, &(0x7f0000000080)=""/207, 0x40f00, 0x5, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000009d80)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000009dc0)={0x2, 0x0, 0x7f, 0x9}, 0x10, 0x4645}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000200)=""/38, 0x26}, {&(0x7f00000002c0)=""/112, 0x70}, {&(0x7f0000000240)=""/53, 0x35}, {&(0x7f0000000340)=""/61, 0x3d}, {&(0x7f0000000380)=""/163, 0xa3}, {&(0x7f0000000440)=""/156, 0x9c}, {&(0x7f0000000500)=""/195, 0xc3}, {&(0x7f0000000600)=""/102, 0x66}, {&(0x7f0000000680)=""/201, 0xc9}, {&(0x7f0000000780)=""/255, 0xff}], 0xa, &(0x7f0000000940)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x12001) 09:03:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x9, 0xb2, 0x1}, 0x20) 09:03:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:18 executing program 5: ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x20020000}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r0, &(0x7f0000000240)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x1, {0x4e24}}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)="fb0aeaf6ef24f499ad7b3450bfcf65c34d80424d0a9d46d1e2b6965b6912dc84dcfc37bc4bdc", 0x26}], 0x1, &(0x7f0000000140)="b0b3f83ad76de086b00d049c3cbbb9505d9c946033b3d4d502119c7700a8a7ff353d72f1489e222c488d26c01cdc66c0d8bc1845af0ee7c17c12d2459851e8edf9fef6c0f175f5a2edba5520625f45016577411e69ebc32ff92d6d8ab83fc9c8ef205bcf2c3165aa7bd006af8c7376b5b05244daf376ef3e423e8656f6a90cd4a389a2a8f4ff47311674c7e2498e81aa66d69c632e9fd0cdbb12e69af186579b96e6937e6ccf433d3ce2076cbd29df6ed9429ba8699ba65ccbd6a5f6c91dc2b27e69df7ba80b93b53dbb16", 0xcb, 0x4}, 0x8000) 09:03:18 executing program 0: recvmsg(0xffffffffffffffff, &(0x7f000000ca40)={&(0x7f000000b840)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f000000c940)=[{&(0x7f000000b8c0)=""/4096, 0x1000}, {&(0x7f000000c8c0)=""/15, 0xf}, {&(0x7f000000c900)=""/24, 0x18}], 0x3, &(0x7f000000c980)=""/129, 0x81}, 0x10100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0xa, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @map={0x18, 0x7}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit, @generic={0xeb, 0x3, 0x1, 0x9, 0x3}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0xb6, &(0x7f00000000c0)=""/182, 0xc0e00, 0x8, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f000000ca80)={0x6, 0x3}, 0x8, 0x10, &(0x7f000000cac0)={0x2, 0xc, 0xc0000, 0x6}, 0x10}, 0x78) 09:03:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0xa, 0xb2, 0x1}, 0x20) 09:03:18 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:18 executing program 0: recvmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000080), 0x6e, &(0x7f0000000400)=[{&(0x7f0000000500)=""/102400, 0x19000}, {&(0x7f0000000140)=""/20, 0x14}, {&(0x7f0000000180)=""/199, 0xc7}, {&(0x7f00000002c0)=""/139, 0x8b}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/11, 0xb}], 0x6, &(0x7f0000000480)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x22) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x7, 0x7, 0x2, 0x0, 0x6, 0x30008, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x80000000, 0x7fff}, 0x80, 0x7, 0x7, 0x4, 0x6, 0x71, 0x7, 0x0, 0x7fffffff, 0x0, 0x800}, r0, 0xd, 0xffffffffffffffff, 0xa) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000196c0)={&(0x7f0000019500)=@ipx={0x4, 0x8001, 0x8, "ec2d8156fbc7", 0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000019580)="3581a02ceccf8d0ce675a70ba68865184e45130f98453c0085915b94583f92a25d352a1900ede5594427935dbf3b5c0badfb285ca538f84f5b7af4dbed038c8d3e3a6e5be653495a41e92933e7e12d973e4e6b13ad05d390f75e26e0ba2130e834e0d95468acd9198048ec458513d738819245a83a346ca2bda6d43ca5edb58f2f3f538c478905b354fea87dd71d7879385708c812c88f92e93e9384efc0a01e20f071421fbe71ca0bb1555c1bf016eda8e641", 0xb3}], 0x1, &(0x7f0000019640)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x80000000}}, @timestamping={{0x14, 0x1, 0x25, 0x20}}], 0x48}, 0x40880) 09:03:18 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x8, 0xc, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @map={0x18, 0x6}, @call={0x85, 0x0, 0x0, 0x37}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0x15}, @generic={0x80, 0x1, 0x3, 0x3, 0x76d}, @generic={0x3, 0x0, 0xb, 0xfff9, 0x7}, @exit, @generic={0xff, 0x7, 0x2, 0x5, 0x3}, @generic={0x24, 0xe, 0xa, 0x5, 0x9}], &(0x7f0000000080)='syzkaller\x00', 0xfffff5ff, 0xc5, &(0x7f00000000c0)=""/197, 0x41100, 0x1c, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0x28a, 0xf26a}, 0x10}, 0x78) 09:03:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x18, 0xb2, 0x1}, 0x20) 09:03:18 executing program 1: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:18 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0}, 0x20) 09:03:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x63, 0xb2, 0x1}, 0x20) 09:03:18 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf05, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x1e}, @ldst={0x2, 0x1, 0x0, 0x2, 0x6, 0xfffffffffffffffe, 0x4}, @map_val={0x18, 0x6, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}, @alu={0x7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000080)='GPL\x00', 0x8, 0x1000, &(0x7f00000002c0)=""/4096, 0x40f00, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xc, 0x2, 0xffff}, 0x10}, 0x78) 09:03:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 1: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x0]}}, &(0x7f0000000140)=""/135, 0x42, 0x87, 0x1}, 0x20) 09:03:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x1000000, 0xb2, 0x1}, 0x20) 09:03:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 0: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x5}, 0x20) 09:03:18 executing program 5: openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040), 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/204, 0xcc}], 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000201c0000000000000001000000010000002bf7d7c00d701bf76c59be1d3bfcdcc1d20ad300223d23c3834319f05a5abca00483fa302035ba3874c7dea25ce3def9d6514e16e6268bea9a22043d7d597ddfdb927bd21b6779c877fc9ddb308cbacc12b56d517bb79289d0a93c703527a6cb7ed47eb94fc6e7", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000200000e8ffffffff0000000001ad24c4", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00 \x00'], 0xf0}, 0x40) mkdirat$cgroup(r0, &(0x7f0000000240)='syz0\x00', 0x1ff) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:18 executing program 1: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x0]}}, &(0x7f0000000140)=""/135, 0x42, 0x87, 0x1}, 0x20) [ 452.905604][ T4684] BUG: sleeping function called from invalid context at mm/page_alloc.c:5167 [ 452.914571][ T4684] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 4684, name: syz-executor.3 [ 452.925459][ T4684] INFO: lockdep is turned off. [ 452.930416][ T4684] irq event stamp: 0 [ 452.934309][ T4684] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 452.942101][ T4684] hardirqs last disabled at (0): [] copy_process+0x1dcd/0x7510 [ 452.951435][ T4684] softirqs last enabled at (0): [] copy_process+0x1e0e/0x7510 [ 452.960925][ T4684] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 452.968130][ T4684] CPU: 0 PID: 4684 Comm: syz-executor.3 Tainted: G W 5.14.0-rc1-syzkaller #0 [ 452.979442][ T4684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.989863][ T4684] Call Trace: [ 452.993415][ T4684] dump_stack_lvl+0xcd/0x134 [ 452.999384][ T4684] ___might_sleep.cold+0x1f1/0x237 [ 453.004647][ T4684] prepare_alloc_pages+0x3da/0x580 [ 453.010174][ T4684] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.016612][ T4684] __alloc_pages+0x12f/0x500 [ 453.021830][ T4684] ? __alloc_pages_slowpath.constprop.0+0x21b0/0x21b0 [ 453.028801][ T4684] ? __kernel_text_address+0x9/0x30 [ 453.034124][ T4684] alloc_pages+0x18c/0x2a0 [ 453.040015][ T4684] stack_depot_save+0x39d/0x4e0 [ 453.045054][ T4684] ? __alloc_pages_bulk+0xe09/0x1870 [ 453.050363][ T4684] save_stack+0x15e/0x1e0 [ 453.054875][ T4684] ? register_early_stack+0xb0/0xb0 [ 453.060312][ T4684] ? lock_release+0x720/0x720 [ 453.065115][ T4684] ? __alloc_pages_bulk+0x8b9/0x1870 [ 453.071666][ T4684] ? __vmalloc_node_range+0x39d/0x960 [ 453.077409][ T4684] ? __vmalloc_node+0x6f/0x90 [ 453.082316][ T4684] ? kvmalloc_node+0xd8/0xf0 [ 453.087250][ T4684] ? btf_new_fd+0x50a/0x2450 [ 453.092214][ T4684] ? __sys_bpf+0x1e4c/0x5410 [ 453.097417][ T4684] ? __x64_sys_bpf+0x75/0xb0 [ 453.102199][ T4684] ? do_syscall_64+0x35/0xb0 [ 453.106812][ T4684] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.112989][ T4684] ? lock_acquire+0x442/0x510 [ 453.117689][ T4684] ? lock_release+0x720/0x720 [ 453.122490][ T4684] ? preempt_count_add+0x74/0x140 [ 453.127916][ T4684] __set_page_owner+0x50/0x290 [ 453.132707][ T4684] ? post_alloc_hook+0x145/0x1e0 [ 453.137789][ T4684] __alloc_pages_bulk+0x8b9/0x1870 [ 453.143404][ T4684] ? __alloc_pages+0x500/0x500 [ 453.148195][ T4684] ? _raw_spin_unlock+0x24/0x40 [ 453.153514][ T4684] ? __get_vm_area_node.constprop.0+0x292/0x380 [ 453.159963][ T4684] ? btf_new_fd+0x50a/0x2450 [ 453.164667][ T4684] __vmalloc_node_range+0x39d/0x960 [ 453.169903][ T4684] ? vfree_atomic+0xe0/0xe0 [ 453.174626][ T4684] ? btf_new_fd+0x50a/0x2450 [ 453.179329][ T4684] __vmalloc_node+0x6f/0x90 [ 453.183944][ T4684] ? btf_new_fd+0x50a/0x2450 [ 453.188650][ T4684] kvmalloc_node+0xd8/0xf0 [ 453.193178][ T4684] btf_new_fd+0x50a/0x2450 [ 453.197616][ T4684] ? rcu_read_lock_sched_held+0xd/0x70 [ 453.203465][ T4684] ? lock_acquire+0x442/0x510 [ 453.208163][ T4684] ? rcu_read_lock_sched_held+0xd/0x70 [ 453.214315][ T4684] ? lock_release+0x522/0x720 [ 453.219136][ T4684] ? __might_fault+0xd3/0x180 [ 453.224244][ T4684] ? lock_downgrade+0x6e0/0x6e0 [ 453.229211][ T4684] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 453.235620][ T4684] ? tomoyo_path_number_perm+0x24e/0x590 [ 453.241347][ T4684] ? btf_type_snprintf_show+0x140/0x140 [ 453.246925][ T4684] ? apparmor_capable+0x1d8/0x460 [ 453.252326][ T4684] ? security_capable+0x8f/0xc0 [ 453.257380][ T4684] __sys_bpf+0x1e4c/0x5410 [ 453.261910][ T4684] ? vfs_fileattr_set+0xa80/0xb50 [ 453.266965][ T4684] ? bpf_link_get_from_fd+0x110/0x110 [ 453.272364][ T4684] ? rcu_read_lock_sched_held+0xd/0x70 [ 453.278123][ T4684] ? lock_acquire+0x442/0x510 [ 453.282995][ T4684] ? rcu_read_lock_sched_held+0xd/0x70 [ 453.288572][ T4684] ? rcu_read_lock_sched_held+0xd/0x70 [ 453.294145][ T4684] ? lock_acquire+0x442/0x510 [ 453.298942][ T4684] ? lock_release+0x522/0x720 [ 453.303734][ T4684] ? trace_hardirqs_on+0x38/0x1c0 [ 453.308972][ T4684] __x64_sys_bpf+0x75/0xb0 [ 453.313599][ T4684] ? syscall_enter_from_user_mode+0x21/0x70 [ 453.319883][ T4684] do_syscall_64+0x35/0xb0 [ 453.324875][ T4684] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 453.330987][ T4684] RIP: 0033:0x4665e9 [ 453.335061][ T4684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 453.355139][ T4684] RSP: 002b:00007efe20660188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 453.363781][ T4684] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 453.373473][ T4684] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 453.381992][ T4684] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 453.390369][ T4684] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 453.403160][ T4684] R13: 00007ffcf12873bf R14: 00007efe20660300 R15: 0000000000022000 09:03:18 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0xfffffffffffffe8b, 0xfffffffe}, 0xfff2) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000001b40)=@can={0x1d, 0x0}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001bc0)=""/96, 0x60}, {&(0x7f0000001c40)=""/204, 0xcc}, {&(0x7f0000001d40)=""/92, 0x5c}, {&(0x7f0000001dc0)=""/213, 0xd5}, {&(0x7f0000001ec0)=""/198, 0xc6}, {&(0x7f0000001fc0)=""/249, 0xf9}], 0x6, &(0x7f0000002140)=""/90, 0x5a}, 0x12020) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002380)={&(0x7f0000002200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x113, 0x113, 0x6, [@volatile={0xd}, @typedef={0x3, 0x0, 0x0, 0x8, 0x3}, @datasec={0xc, 0x7, 0x0, 0xf, 0x3, [{0x5, 0x1, 0x10001}, {0x5, 0x3, 0xa7a}, {0x3, 0x401, 0x7fff}, {0x1, 0xfffffc00, 0x3}, {0x1, 0x3, 0x400}, {0x1, 0x1, 0x40}, {0x3, 0x5, 0x6}], "4e69c0"}, @enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0x4, 0x6}, {0xa, 0x3}, {0x0, 0xffffffff}]}, @ptr={0x1, 0x0, 0x0, 0x2, 0x5}, @enum={0xd, 0x2, 0x0, 0x6, 0x4, [{0x7, 0xfffffff9}, {0xf, 0x4}]}, @int={0x3, 0x0, 0x0, 0x1, 0x0, 0x4b, 0x0, 0x7a, 0x2}, @volatile={0xe, 0x0, 0x0, 0x9, 0x4}, @union={0x4, 0x3, 0x0, 0x5, 0x1, 0x63f, [{0xe, 0x3, 0x208}, {0x10, 0x1, 0x8a54}, {0xd, 0x5, 0x2343}]}]}, {0x0, [0x30, 0x5f, 0x61, 0x61]}}, &(0x7f0000002340)=""/6, 0x132, 0x6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000002440)={0x17, 0x3, &(0x7f0000000000)=@raw=[@alu={0x7, 0x1, 0x3, 0x7, 0x2, 0xfffffffffffffff4, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000040)='syzkaller\x00', 0x1000, 0x2a, &(0x7f0000000080)=""/42, 0x41100, 0x2, '\x00', r0, 0x8, r1, 0x8, &(0x7f00000023c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002400)={0x5, 0xf, 0x80, 0x54}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 09:03:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 5: bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x100000) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r1}) 09:03:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x5f5e0ff, 0xb2, 0x1}, 0x20) 09:03:19 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000001c0)='THAWED\x00', 0x7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000200)={[{0x2d, 'rdma'}, {0x2d, 'pids'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2b, 'io'}, {0x2d, 'memory'}, {0x2d, 'memory'}, {0x2b, 'rdma'}, {0x0, 'io'}]}, 0x3a) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x3, [@enum={0xf, 0x7, 0x0, 0x6, 0x4, [{0xf, 0x4}, {0x9, 0x1000}, {0x7, 0x9}, {0x9}, {0x5, 0x5}, {0x6}, {0x1, 0x9}]}]}, {0x0, [0x0]}}, &(0x7f0000000080)=""/202, 0x5f, 0xca, 0x5}, 0x20) 09:03:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x61, 0x0]}}, &(0x7f0000000140)=""/135, 0x42, 0x87, 0x1}, 0x20) 09:03:19 executing program 1: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x20) 09:03:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') 09:03:19 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffffffffecc, 0x1}, 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000002840)={&(0x7f0000002640)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000027c0)=[{&(0x7f00000026c0)=""/198, 0xc6}], 0x1, &(0x7f0000002800)=""/6, 0x6}, 0x40000002) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002900)=@bpf_lsm={0x1d, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xffff0001}, [@generic={0x7, 0x8, 0x2, 0x1ce9, 0x9597}, @call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f0000000080)='GPL\x00', 0x200, 0xf6, &(0x7f00000000c0)=""/246, 0x41000, 0x5, '\x00', r1, 0x1b, r0, 0x8, &(0x7f0000002880)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000028c0)={0x5, 0x2, 0x101, 0x8}, 0x10, 0xffffffffffffffff}, 0x78) 09:03:19 executing program 1: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x20000126, 0xb2, 0x1}, 0x20) 09:03:19 executing program 0: bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="f074a236ca0e70a61949f7849fc82730826028d487f6b394fdc347330088d010849c6a1c30561f005f036649f8b1ff611d87f073071b9cd40c972e8c727be20c9d091905af160f014140a7b73a0b739f2d02df7cc8cf73e0c76d53fc72b0435c715327b239ea2aa09309", &(0x7f0000000080)=""/224}, 0x20) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x2, 0x4, 0x4, 0x200, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3}, 0x40) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={0xffffffffffffffff, r0}, 0xfffffeee) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:19 executing program 1: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x2}, 0x20) 09:03:20 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) write$cgroup_devices(r0, &(0x7f00000002c0)={'c', ' *:* ', 'm\x00'}, 0x8) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000000300)="559243b860d77858abedb096ada1d890fb9883366183eb4c5d8efc8b57842e443b28e91ca2928c38851a49992477a346c0c6ec321388d1c7ebba35f1c6220fec2cdc03bf787a1cef91071cd1250ebfb1c2e389459a8f0f98c1268303a36317cea67f42fce0a72f2405f0889d3be7137cbdf0eab469ff11b3aae50cd19b80ba86b47e49c9103230532584dc7ee560bdb96aad54ad4f736a8937d68cce26f2759c8c00538d16d28a66cd81d2849e0f245a6bc92c6046071a907963ec533ca074d12345f5b12bf113e4f4b7e36dfec740100f69c9536680280b9f55d5", &(0x7f0000000400)=""/35, &(0x7f0000000440)="ad23b0edd070a1a9de529fdf991f281346e2b583362f5b590e92c53ac6d9c4265d08f2d94611f5c0902d6eea1c1d50eb234afc7243a9de9d974d61bf6f4816e67f2799a3f79064f80f3d881da2ffe4c77e82a5334ce7ee2c07ecc186a15f1c8e41cb5b283b432cf1f7284eb974ea1856013f5fadec31319596c6cac86fecfa2b", &(0x7f00000004c0)="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", 0x8, r0, 0x4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x110, 0x110, 0x7, [@struct={0xa, 0x2, 0x0, 0x4, 0x0, 0x9879, [{0x2, 0x2}, {0x7, 0x1, 0x7}]}, @volatile={0xd, 0x0, 0x0, 0x9, 0x2}, @func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xc, 0x5}, {0x4, 0x2}, {0xc, 0x2}, {0xc}, {0x10, 0x4}, {0x2, 0x3}, {0x2, 0x2}, {0x6, 0x4}]}, @struct={0x3, 0x5, 0x0, 0x4, 0x0, 0xfffffffd, [{0x3, 0x0, 0x6}, {0x1, 0x2}, {0x4, 0x3, 0x1}, {0xe, 0x3, 0x80000000}, {0x7, 0x4, 0xffffffff}]}, @fwd={0x8}, @enum={0x8, 0x5, 0x0, 0x6, 0x4, [{0xd, 0x80000000}, {0x10, 0x7}, {0x7, 0x3ff}, {0xf, 0x4}, {0x7, 0x9}]}, @const={0x4, 0x0, 0x0, 0xa, 0x4}]}, {0x0, [0x2e, 0x0, 0x5f, 0x61, 0x30]}}, &(0x7f0000000140)=""/155, 0x12f, 0x9b}, 0x20) 09:03:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:20 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)=""/255, 0xff}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb8}, 0x100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x7, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x5a}, @map_val={0x18, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, @alu={0x7, 0x0, 0x5, 0x0, 0x9, 0xfffffffffffffff8, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0xc, 0x0, 0x1, 0x18, 0xffffffffffffffe3}, @ldst={0x3, 0x2ab6bcc75d45a1a1, 0x6, 0x5, 0x5, 0xffffffffffffffe0, 0xfffffffffffffffc}, @alu={0x4, 0x0, 0x5, 0xb, 0x2, 0xffffffffffffffff, 0x1}], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x18, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x1, 0x503facb3, 0x91}, 0x10}, 0x78) 09:03:20 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x7}, 0x20) 09:03:20 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x42, 0x87, 0x1}, 0x20) 09:03:20 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008800)={&(0x7f0000008300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000008780)=[{&(0x7f0000008380)=""/168, 0xa8}, {&(0x7f0000008440)=""/173, 0xad}, {&(0x7f0000008500)=""/218, 0xda}, {&(0x7f0000008600)=""/37, 0x25}, {&(0x7f0000008640)=""/253, 0xfd}, {&(0x7f0000008740)=""/11, 0xb}], 0x6}, 0x12000) bpf$MAP_CREATE(0x0, &(0x7f0000008840)={0x17, 0xecd0, 0x5000, 0x3, 0x7a0, r1, 0x0, '\x00', r2, r0, 0x1, 0x2, 0x4}, 0x40) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000200c0)={&(0x7f000001fd40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000020040)=[{&(0x7f000001fdc0)=""/154, 0x9a}, {&(0x7f000001fe80)=""/144, 0x90}, {&(0x7f000001ff40)=""/224, 0xe0}], 0x3, &(0x7f0000020080)=""/53, 0x35}, 0x162) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r1}, 0x8) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x40, 0x0}, 0x8) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000440)={r4}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1, 0x8, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xa5, 0x0, 0x0, 0x0, 0x5}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, @generic={0x40, 0xf, 0x3, 0xe7}, @ldst={0x3, 0x3, 0x2, 0x7, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}]}, &(0x7f0000000340)='GPL\x00', 0x40, 0x0, 0x0, 0x41000, 0xa, '\x00', r2, 0x12, r1, 0x8, &(0x7f0000000380)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0x5, 0x5, 0x10000}, 0x10, r5, r6}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_tracing={0x1a, 0x8, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x1}, @jmp={0x5, 0x0, 0xd, 0xa, 0x7, 0x6, 0x10}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x5}]}, &(0x7f0000000100)='GPL\x00', 0x2, 0x7, &(0x7f0000000140)=""/7, 0x0, 0x1, '\x00', r2, 0x18, r0, 0x8, &(0x7f0000000180)={0x5, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0x6, 0x1, 0x3}, 0x10, 0x168ee, r4}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000020180)={0xc, 0x3, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}], &(0x7f0000000040)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x28, '\x00', r3, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000020100)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000020140)={0x3, 0x6, 0x0, 0x219b}, 0x10, 0xffffffffffffffff}, 0x78) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000540)="6dd211e85a0660bb8d5e82f76e52700432360a955cdb38114cad588a75f4fcd9501f0e91147727a12fc26ca46c03db58e2a183a4449971405d0935e6a73fbe17f934ee921da0eee5ba97314128e75abcc38feae43003cdaaa78b057e0bb687e2bbeb1900a08320ab0552663fa453fe3586904b552f131e04d29b32b0252384abea50147ffd3c40f374b5035e8aebce729a3f84f1bbd60e02c67396080e1a", 0x9e}, {&(0x7f0000000600)="fb5ecf1a7cb6d743ccfc859166736a20e3e4cb4c5f55fd49ac2a1bd175f3e0a45bb79d729c5f6e265fb8c8d4772301e105a3a069e3f2d066c6f733c4838b2ad5f9a8626cd9812a99ecd4e3bdd87726299352bb6d130d8ca9e982cbf8ae49147dc653017c8d6da8193837fdb8b8bd611bc48a2666dc75e2afea08a26faf0b31791cf1cda8d7f0eac27cc52ba532a288d6dc1cb4f4d6fa56d437b1063c30385d78444eaf9d522886867a35c377098eef0cc291331eb3e0eac04025ce9c96e04bf40b4a77fdeeef29d6e9a90e310412e76633f80ad7628266d68cd1a2445ddef28503db515d1c865fdd5a321b889c", 0xed}, {&(0x7f0000000700)="ad83f163d3b8343878f4df19333469ed01fd24abd52f7764df57722d60e3c8d5b0eed177eb37931776de52f901e06bda9c5882ef9598ec243b6bb3dec7817ffbca011c6aa82f9a5c790d9e82062ffa8d0c1a18155b955923e1f86b9bf2084aba70db0e35e13cbae27caa9d58b032e546a4dfc20ca23414af30283c93d74c2df08f138554fa7ad99804e46bb5495b976ad5c64f705ab28a6e7c400a7920ed6a8c97e8d9ef02bfce312574b2da6e704cd2622c3034cc267a4a24ade8", 0xbb}, {&(0x7f00000007c0)="a1d43f30f3ad9b2cf5179dc25f6a6ea7fbc11eabeb397e6f6d48433894200c9b1282ffa1a65236ff3bd62f731f032dde620775c50c82ff04b12943", 0x3b}, {&(0x7f0000000800)="1fb5c09309a820eacf5de4681341da5a46b4d8b8aa40a09252b873cc6aba1dc673eff7f9d8e62d27787fd6036a5e6329b5439eb4eeb18e5597973de57eb582a6f73767fb25f187950d996b8856ec91d763726bd00f4aff59aa9ba4505fd8988a5179ca3a11fed5ef235e5bccb9ea078621cff646183ff58becb98086de023c03cb1a52c92a6f2c2262a07ec0d94bf9b286b8f088a72c8621b468a03850cdb9e3d94a3d9c0e", 0xa5}, {&(0x7f00000008c0)="622a185166b0058d044ac26434fa54b3712c58bb0609318b52949ae0251e9a444159d063ccf0a696ad63b9682840ac811b4446", 0x33}, {&(0x7f0000000900)="7a1828d0c3bf4c4512c8af611e5850e5a7432c3e152e73cc497e4220c1b89c5a1951a5b6b43f2329bae37c55d9e8da496d6ede7d2e05e1b846721355e35f9ed7b9e3e836c09b49dd5e54723c79b4f13856b3a7bfe403434fe41c17a256c0ac788f673c9caad2acf988f1d7fe6ec9b720f9e084e9bc6ad6774fa41c6c77c6ba72752db5e72e195301aed212dfd41c443ef1cbbebb67cb3736a9aa1e", 0x9b}, {&(0x7f00000009c0)="242c186769e9a4a634eab7e1c27fd0f66531fb3de436f5ee22ac5fc1ba4ec4ba2c8c2ac03306b3bb89c4972e514fc41a46ef50c013d3d749b7268b", 0x3b}], 0x8, &(0x7f0000000a80)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0x64010100, @remote}}}, @ip_retopts={{0xc8, 0x0, 0x7, {[@timestamp={0x44, 0x28, 0xef, 0x0, 0x8, [0x10000, 0x2, 0x4, 0xffff24b0, 0x4, 0x4, 0x3, 0x7ff, 0x7]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x44, 0xd1, 0x3, 0x7, [{@multicast2, 0x8000}, {@multicast1, 0x8}, {@broadcast, 0x40}, {@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0x44}, 0x975e}, {@broadcast, 0x1}, {@private=0xa010101, 0x1}, {@multicast2, 0x7}]}, @ssrr={0x89, 0x7, 0xb1, [@broadcast]}, @lsrr={0x83, 0xb, 0x4b, [@remote, @local]}, @timestamp_prespec={0x44, 0x24, 0x63, 0x3, 0x9, [{@broadcast, 0x8}, {@private=0xa010100, 0x1}, {@local}, {@multicast1, 0x1}]}, @generic={0x83, 0x12, "a7bd638d339fd6c305891e41c9f59f23"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}], 0x148}, 0x54) 09:03:20 executing program 1: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x8}, 0x20) 09:03:20 executing program 0: ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3f, 0x4, 0x4, 0x2, 0x0, 0x80, 0x2086, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4080, 0x0, @perf_config_ext={0x7, 0x8001}, 0x800, 0x9, 0x1, 0x9, 0x8, 0x7, 0x1ff, 0x0, 0x20, 0x0, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) 09:03:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb1, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:20 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000080)={&(0x7f0000000000)=""/99, 0x63}}, 0x10) 09:03:20 executing program 1: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0xa}, 0x20) 09:03:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="7eaa96270226479680c5a4adf0dc9fd113ef52e3708468f700da582fc248e2256bfccedd4a9c43845166af5f12ec5c9f3ea9a605258e586cfe278a60c47f0a856306747f1c8917d74ae73e100521038721c29ae4b3298df51eb6cbd75da3943c47b850cc14890f9fd9c7aeaf0edbfb0f670bdb1d4efa0b4b46d95a2ea8f4ccf3110419a2cfa7459bfa9c8d2a5a181b30f3849a160d853d497de1377db39cc881e0571523bf7f5e84ac289b22c7c43a0b3c963d2261f61a3d662d92b5d3d29b46fc3a626a273f5a6855356f969ac1c2623e168eaef1ef722bb823ebc68299a7d343eb76eafd50cf2d6caa208ed540b0c065ff24", 0xf3}], 0x1, &(0x7f0000000140)}, 0x20000800) 09:03:20 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e22, @private=0xa010100}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000040)="cc57f05dda861c5cd3ae3506989fdfdb5b6cee3c5a5b2063e87aafe2568026e536bb1d9c166af84ea4442458fdc73ee238d6a295c985a164e9b4b0ee69e43add0a14e04d1d2172fadec749529df7ddce7102fb6764a496c54b5e7e59697573e5607361c177b5f2a228e9b6b848063c043b9d762d15ad24a0b9f88e968176c480b54ba629ef916a55db4a8be0b4174de7c81c6fa5c85c", 0x96}], 0x1}, 0x4050480) socketpair(0x0, 0x5, 0x7c52, &(0x7f0000000180)) 09:03:20 executing program 1: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 0: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x4) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x63}, 0x20) 09:03:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x61, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:20 executing program 1: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000000)="057d30b8883bf9365f013d00cca108c40bf006922132ceff5e18b103aabfa926d655a6ac418a13f56cfd9df06f49b9af836f67c4868c0770d91c5ff9d5fabb", &(0x7f00000002c0)=""/4096, &(0x7f0000000040)="667d7f080940138c11d3215e7cec5aca5162b383a6f210a23c6b4450b7a104ea1d6e3fb5ca8e10b4cf5b127a7a8138089f691e84e4ca6194c3f71e93ef90332f3e2e33a0984d802c0b5597eb76f865a1a95023a1dc72c0cc436840385b5dbcb1eb708a2d7844b72c9174e4e1daf533d5958670a4a297340f58e174be53db90fe3bf99f89e0041f558ac8db77275b489e084c679eb09a76c4a23acab9c34a8f725ce9cbec6c8e6361cb61ff7b1c83f9d68d5cc703bdf451f8e5d676cf1ea5cc939164a1deff55b7b21d5140cb1a4c14ad", &(0x7f0000000140)="69973cd055d24155b3dbb9d61c72af41447ff33658dec029a8ad482556d8b2151cb4941eb613f6a98b22407ab3d96f78f542145fd32d2a7d46c11e5b129e43c81b4b8e91793b71e60dba1c2a0470578742dc13f1372d9c2fc45a3d040b5f9d8ac8cda2d8f7f3df60337d02a2fba2831d4712d9e9175f9a55c1282bd7eb7f0b43bdaf372747dbba6472e78560717dc79e1dad27b89927711134054f6fc1ca8d3f3273143e", 0x9, 0xffffffffffffffff, 0x4}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000001500)={&(0x7f0000000240)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000001480)=[{&(0x7f00000012c0)="23b1a90542f6cc824b2aad234edcc479ba603996e92559f49d50347a279c20359f9cddc470e6d7fb10ead0d8a71e9b610454fdba898bbc70a4e56dca5acab040bc1e5fda7b7b526e5d443f394a478b28d476b03e3a0628a12d74d6b35790eb69b00c14b434932a379d720afb21cd8f5d57413471bd1d84732518592e860f14f5629e7a08a04e06dfdc0d50a43b6d0d509b82311a5fdb8e3c00a9010ad3fc8a46c0095a72265902f5f691352f1c06da159929bad210ac997abbee0fffb34b2030b60c3fd54351aa5be073632792af79a783055a04ae8993b06d7701fb7f8cf9885109ce1c7ab28812e1b61ecc96b769d386", 0xf1}, {&(0x7f00000013c0)="679e8e52bc31dcb341e1a029c3032accc2dd63c03fdceb69f280a7ef05826ac8eda7a71473f8ba4dd58175a455e50d974ed726fd4bf55dd0cf31e3ea0965ade80c45ca70cc72e5911625e0abc640a2b42f733832544f3e7d414cb2674a37805188a83cb441096bc0b525f89ffacdaf3b216a023f0beed928441bd29e7a88106c29cdd7b308fafda59ead4487940e0ecbdc", 0x91}], 0x2, &(0x7f00000014c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @empty}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}], 0x38}, 0x24005851) 09:03:20 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000080)={r0, 0x10, &(0x7f0000000040)={&(0x7f0000000000)=""/3, 0x3}}, 0x10) 09:03:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x300}, 0x20) 09:03:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:20 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:20 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) recvmsg(0xffffffffffffffff, &(0x7f0000005cc0)={&(0x7f0000005700)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005c00)=[{&(0x7f0000005780)=""/46, 0x2e}, {&(0x7f00000057c0)=""/177, 0xb1}, {&(0x7f0000000040)=""/100, 0x64}, {&(0x7f0000005900)=""/186, 0xba}, {&(0x7f00000059c0)=""/160, 0xa0}, {&(0x7f0000005a80)=""/140, 0x8c}, {&(0x7f0000005b40)=""/135, 0x87}], 0x7, &(0x7f0000005c80)=""/23, 0x17}, 0x40000000) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000005d00)=r0) 09:03:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x3ee}, 0x20) 09:03:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x41, 0x87, 0x1}, 0x20) 09:03:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x3f2}, 0x20) 09:03:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:20 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003ac0)={&(0x7f0000002900)=@can={0x1d, 0x0}, 0x80, &(0x7f0000003a40)=[{&(0x7f0000002980)=""/11, 0xb}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f00000039c0)=""/87, 0x57}], 0x3, &(0x7f0000003a80)=""/41, 0x29}, 0x10141) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0x9, 0x0, 0x0, 0xc, 0x5}]}, {0x0, [0x0, 0x1627ac7ded4235b8, 0x0, 0x0]}}, &(0x7f0000000040)=""/162, 0x2a, 0xa2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x18, 0xc72, 0x11d, 0x3, 0x1a02, 0xffffffffffffffff, 0x5, '\x00', r0, r1, 0x3, 0x5, 0x3}, 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000003b00)={0x3, 0x3f, 0x6, 0x1ff, 0x0, 0x1, 0x5, '\x00', r0, 0xffffffffffffffff, 0x1, 0x1, 0x1}, 0x40) 09:03:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, 0x0, 0x0) recvmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000080), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)=""/14, 0xe}, {&(0x7f0000000140)=""/43, 0x2b}, {&(0x7f0000000180)=""/168, 0xa8}], 0x3, &(0x7f00000002c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}, 0x0) r4 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000040)={r3}) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x42, 0x87, 0x1}, 0x20) 09:03:21 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffff0c, 0xfffffffffffffd07, 0x2}, 0xffffffffffffffec) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000540)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000700)=[{&(0x7f00000005c0)=""/212, 0xd4}, {&(0x7f00000006c0)=""/14, 0xe}], 0x2, &(0x7f0000000740)=""/250, 0xfa}, 0x10003) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xe, 0x0, &(0x7f00000000c0), &(0x7f0000000100)='GPL\x00', 0x3, 0x4a, &(0x7f0000000140)=""/74, 0x41100, 0x2, '\x00', r1, 0x24, r0, 0x8, &(0x7f0000000880)={0x8, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x5, 0xe, 0xfffffffe, 0x1}, 0x10, 0xffffffffffffffff}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000080), 0x0, &(0x7f00000000c0)}, 0x0) 09:03:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x3f3}, 0x20) 09:03:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x7, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) sendmsg$inet(r0, &(0x7f00000013c0)={&(0x7f0000000000)={0x2, 0x4e24, @private=0xa010101}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="b0521d3fff54417d40787abc9fbd2825a7ec8e59304ac22e85cd1e1dcd15a5647900e3cdc484b8aa22f8ea299497", 0x2e}, {&(0x7f0000000080)="b4f300b3cefdebcfb66b905270c2116af2c56c106ec7e1642e65c8c504de5a4b08163cb4cab8ba45ff3a97a79e075e65c4190cc5ab130eb8cfa6a29aaa92237326961d54311db143cf8c3a549e7aafd95ef50b36f58d9924dfd2221f93d2e80fa66f340fda3de26ea2be60195371fc0d793dc49ea7d341ac0acb3433fedda50e531c773e17129ae0cebcbc50bea39908f95d1617e05f10dfec02d726e12979b2aaecf904c951364048d717e10fa799d786c13f94e2f6f75661048378fd526131a51f253e9f1fcf150d58696585e9b590b6ddc8f5691de7ba4fdc92ba33cca63f82c82c24", 0xe4}, {&(0x7f0000000180)="b6f3a4caafc92c011d3399b2aae70f3bb86cf3b986b7945f2fe7a2f6eebc0bb4f535d9c9600484751f9bc0e3a9c350a14d5e5ac48f", 0x35}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="63ab0a3c3b1c9a8a0562cc22d58bfe667f950d1629aaecfbb06ad925c76b045e89b51d39c940901891d8e440b1070d70ed6e4da22b0d23fde5905fd39aec1b20ec4ae804dcbe3c7fa72fc42baa2e89627bceaa224c0695d681411d6147e43ba09950cb583c5c7874d63b6b39eaf582f1ddcb349eefb81631fb3e1ca6b505261ea032599b0686ed5b66b4126d6ec49527c459feb1fd3ff37a60d39812da24599b189097308db31b1421ae8a070355de100157712c52705dbd386fd3a04887bae32225ddc7684c6eab59", 0xc9}], 0x5, &(0x7f0000000240)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @dev={0xac, 0x14, 0x14, 0x38}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x38}, 0x4841) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x42, 0x0, 0x1}, 0x20) 09:03:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x42, 0x0, 0x1}, 0x20) 09:03:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x3f4}, 0x20) 09:03:21 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xe8, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1, 0x3}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffa, 0x2}, &(0x7f0000000100)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x1}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r0, 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, 0x0, 0x2, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300)={0xffffffffffffffff, r1, 0x6}, 0x10) r2 = openat$cgroup_subtree(r1, &(0x7f0000000700), 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000740)={[{0x2b, 'memory'}, {0x2d, 'cpu'}, {0x2d, 'rdma'}, {0x2b, 'cpu'}, {0x2d, 'cpu'}, {0x2d, 'cpu'}]}, 0x22) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000400)=""/163, 0xa3}, {&(0x7f00000004c0)=""/124, 0x7c}, {&(0x7f0000000540)=""/102, 0x66}], 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="38000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000090000000000100020002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xa8}, 0x42) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000006c0)={0xffffffffffffffff, r3, 0x1d}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 09:03:21 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0x9, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x9886}, [@ldst={0x1, 0x0, 0xad83c6283b12f985, 0x5, 0x4, 0xffffffffffffffff, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xc5}, @map={0x18, 0x1, 0x1, 0x0, r2}, @alu={0x4, 0x0, 0x4, 0x6, 0xa, 0xffffffffffffffe0, 0x8}]}, &(0x7f0000000640)='GPL\x00', 0x1, 0xf7, &(0x7f0000000680)=""/247, 0x2a5a19ce62ed638, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000780)={0x4, 0x3}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x1, 0xfffffffd, 0x7}, 0x10}, 0x78) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000140), 0x6e, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/202, 0xca}, {&(0x7f00000001c0)=""/167, 0xa7}, {&(0x7f00000003c0)=""/235, 0xeb}], 0x3, &(0x7f0000000500)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}, 0x40000001) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0x6}, 0x8) 09:03:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffffffffffd62, 0x5}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 09:03:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x42, 0x0, 0x1}, 0x20) 09:03:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 0: sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x0, 0x1}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="6a82745a7fdf61d130a66e43317cc1d0c25d10d8edd91c2e9e1bb2469fe850aa0c09b6bf", 0x24}, {&(0x7f00000000c0)}], 0x2, &(0x7f0000000140)="bebdd109747f8a285297ce90e5ee586e8283f4b5952536f37d3688", 0x1b, 0xa8}, 0x10) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000000c0)=0x3c8a) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4}, 0x20) 09:03:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x3f5}, 0x20) 09:03:21 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) r1 = openat$cgroup_ro(r0, &(0x7f0000001b00)='memory.stat\x00', 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000140)={&(0x7f00000002c0)="cfa11f0a43939eb718b58c12255cba6ea8617ace519816ebc8a802b679c104f624d66a02cad2fee310d696b51b2b0c703a9dc1454978b9791b8f49b0252c07ef2bfae97a9a7050d97e4ef9157a322e75c422169e9ad7315cdd7774d2c4a3745b4693652bec172ce94f48386d727f3b639b2840c43798f5dd258bfc582d08f3ae323a82d61295f03b451143074b200e0027b937e6af824fb74c7cd226c91b77fd88d2f569a4ce29e368e2ca34dad6e70d58d173ef4aa8ffac7c48fe22bd2035dcd7710b7399dc5701d3a1124095ef1229c4cd72c8ffc145c01fe63b2bbf2c9ceb937883ec5a775c91e25248d0aa0a5ad6bb8465e001b0debe9da75af043805ad6ea9361fba2821973be6c252fa32118d8e7bd76f7122438bd8204407824551657b67f472f28ba1f1654007ebdb2f0cb6c68501e742f11622ee229be963f87eda2ba0bbb617dd8c4c3c954e0fc0535fe0520c574315e154a010f142205cde5e636e6d5bbf1f4da09a3780890199d8085ed2055f6618139daf1b2205af5cf0f8b3dd5f4007ba168fba38d6a35331a8f2438bfc457d7d2dd3390cc779a530d8ce72fad29299e5b93a1ab5ca98336e5b47bb6ffaa8e240b57c432e228097b2d4fce0c616509311bd2d8b5b15379dee6014f321c7fd9860df5c164e8384b426bf8b2d66db41c19750f8e659318db429f8e07b20e3186a02cc9445c750bc7b896f89cc515d73e16c631034fbea4d06c41fbff4718cf400ff183b4bfd61e4942c761a394c132a5b6f6cbb9bf45406972cd5762a20dd648d1b7c9be6c07e4b31b148a83218ec9858aadd4c8c37521f0bf7a79617511eacafc7d10a51de0b26f756130f6cea73fcfb8c5fccc63b79c27486187548e9760a40d890bc6d14b7bbf0adaa176a9c48a57c134801deac749d57520dc7fc6db97394af35ae11633d71a5b60227e4f32a83ff14822b7b1dec58c14863c01ab51c4c8c3768cf07e22d07b47d95a10c24964d57b3c3841137b1b967bfb69b26935a22a41c910b0fe41adaba7e7d9b0826d9e55eb1cfe3006752c4096627af9d990a59bcc9cc5c6dae1653fa55e168c8f84039a2a6f56acad3e3f40a18e7d06f59689c789bec6dd7f97bdc68d8d76d7d6b92342daeb48858761e85fde31d98a686234faa5783b8bd9a5816c289e6a42f51b90c2a349145ba1be4fb55e256f603fa5f3aa863a8c93656bd0123440d54f4c0873e66d7f9784648906e113977909dd8b1d36e2ddfdb94f67f7144c9e78df0a0edf8fccc7a8211ad2ca3872faa60edffae3ff87d297aeff1486e015fd0e7e39d196f8b722b81eaa6b13d31f905e279e14a7da9d079224c7c600cb59fa6c72e7810cb5bc9d7f306987b3e918c75e48301740c657b41629f334d510668a86a6875e361ecca9c5b43e6976e1c6360b126f47c47627c9508efd7e0f804d224aa9a702b944f7603e712283659b255ad9cd8b391328a58133888fd647bb6df05d8a675b9fbae25c977b8fd3119bac8fdca9f45692aa4fcfadac6ec0ac2bcad6e4b0f81d7f4d70b406a01ff181c30bb6a61c5026a130ef6d8d70d0ac85084b57c2347616e40970b73edb520a3c3c542f401d671b4982d7f134565a82d249a9743b0eca1031d42cad96bcfe90d069e2a3001bece056b04796851428ff85e54dfd7ec79ca97f6dad5b9b5a232104465b8e5e838f249c9376c7c8d5ff5dda89354f862dcfdee45f9f9ad4f5dc64ee492de14efa0948251a3fc864517ce447bdc4ba3e070cbb6f01fbd7d201f13d0a4b3142094d821e988112268adbe71583d141e8b55a441886b6be4a81026cc30a24068a24f5fa6cca7cba8350bd93f3ffac757f6a9c17f00f8e65ddc34703aa6cc3b6d7a2c7bf0a85e084f20c96bd3d7fb882863f5e1693ab7dc64d00b4229a01438e44d0be409db94bea367be18284312621224235a154c1cca046193aaf0fed2697c95db7ca00de6dc83695be730fd0c9cacb0716d68b5e236e2076bcb843e2b07a82ffa370fe0bd74d6839706280fcf8084ce6f6367ca3fafa5bf126d377b4e40bbc5dbd6c905306a739ef00c6f433388630ddaa8c030a09120d4b2c5f053eee21ae5864b9ec14c63d9d53235dd3783ae7a5c05908e8d8f2e1e7e97f23461cb9b86ac81e02efbbf6d49285d115781d1f4840c1431e18174fa3ca443546fbe9a362a010536fecf224be516e49c96c8e641e72fc0c760721871a3ab3b94547dc1873d4c79bb357b666437b07b77cd9bbd34d3d7e2a26f628518949a74aff341e45ef8d98aea6db09d24716dbfd32321b4e65d8ee78c1fae2b0ab28a79e64e7205680fbefce6fb57d674ed4cea910f7ca5b17f453c4126abbc0c960b2259184aa7d58a674fc6c6935adf31ccce57c646eac875f33f7c0ef4c7b8c53095862e44308afae69371dd8ad926787ccc1d3587f003bcdf1d4d4509ac3bee615410b02318868c64d45c6d686e1fa4664a6af324ee8635cbd2374eac04173d45952b42e3d5adde8c1ac395f991f8867fc117ea92c6ab6363264c7815c68526feda9f21abf78ada6c45068baac8e176ca0439221841ef3e9cddf31534c91be92464aadb7b6bb456d6d05559b21604f7e8b2f9e8c04a1d2b2dcd4572258b23d157df9f48624ed15578a0049be773a7814258e6082065f2ea4e7dcc72c91c81cc81847c03c5622d98acde8e48c769d33fce53a91639496d6eb9706be7f43e244111bd2537dba8132babc13cf984b3fb3d5f66f62103d2c0398058b8f18e6fbfbf3d0ee807da7fcf1581d73957a3a36b107348bdd930a642bf2e40a8cdea54dd881c27bd1c07f16c99884bcd4b2be62fa54a48850dbccfb5370dd24d024faf40171031ce991e2c96a62002d227fc10daaad44bcd2b02746a6c4def829dc5a937b7a8ecf89328d382614f49ff41a8804a14170b39e265346a98b51515472c4be9b6398ff49d10fa5cd4b4d86cb461a892e11b6a41e25f19d6105c675ee2d8e034839fdaf76bb46bd0c9ad0dec312192d44c3e7937212a56c2dd69ba919610e1b04bc496b89492668ff3ef857c9b9504f198b11e2b44fa07595d59744f0061491d7e7b62a826e7b086a9d864b5e75e5875e4cc898ac0e5008beb0e5e209f7e9d5895a1ff5a480562cb99b47ab6698eb2e12d7f002219bcc0dd4dfd0de6d772ae65e58a69973fee98b601ac054bf0945f321a72ad3729c1b970b1d5d97268f7388c2ac7a360cfa5825a2c76c4a8d06d2ee10ce567f81583e6a289e59c11c6efb4d61b306a6a016b9d6f510fcfbd0d66fc11b473c61280933c90518e9c9f08fde47eab6837bb6cfaebb0df7d11727da53bf050009483198b972028a6fc2718c888e5d88646ad25b80cf8622b200d5884d166a454a7c58a325fdf43eff9760207a6b9c326dd9ae318b5313f2270364c5ef2687a400db8d0d681952cd1e2aaa154a0ee260d5be996b0ae6e302dbece012676310631754b7870f4eba4772dd6eb727239cdc46bd1ed0fb665f49b12ea1813162e9afe88078aae084d0a1780ed8f86107f62b1fb13f77bda598a2c8b46ae4145ee3449337fd0794bf76f7217ed403ec8a053d7a7d502c1d4e51c8312c2f71cf265db91cdc464a275bbda753fc627401cee1e0bdd7fd285530c24612ef3b57a5ad55963fe339ab7be4c8da1a88da76244743ddc20e22a720fc628ad4bd7baef1d89c8f3fd35782cb012ceb1ba23c22ce5531081df3da146124d502b89242339a323ba145371bf9a22793651adbdd2f1bc991f815d3afe6db4c12e8ddf4b2e9251cac0ce60b00017735de64437b7628848b8920a44aac9db33665a053e971c59e79209804f4e48a086ceca978c91a6e16af9d0e128e10fd441be88b2636f087e46ce7836fb8d0c33c293dfbf2ca8faf9c361f331b71c99e13e0c2c8f841c728487a93080dd400e0ed537b2fe6b9ba7e75ec45996e16a6790fff5dfd4280f4b98a4ad7ced5268ca134dbff36aa3b24194759807dafc05d9c76e1f70453b9944da214a6d2e3de72ca362a0f93248066653e0306fb30b3e22336dbff892eda921f6a46ef6db135aa3e3f2b1abf21fa4dee36b48416c54cceb0a76dc99935a9a80e10df2387889e4c187e8ac22ec4d5003e81fce64148e54dd4d097379060ebb24cf13710ce5a3ddde2afe164fbb1ce83903010d330889cdbaebd852cb07c6b56c9e88a8b9368d6e2660fb6c1d462c576f953fb018502d750655a8f8f9eaa4d51678581f5e78a6a3135fb385ae82386566af2809e545d1eea5b174f1b65ff56907fd624db1f0ea87f32b765ade0f2a35612372adb69c7a63f0bc6d055561cc7cb21e2864f5dee269db5c7ca47cfdbb0371bdd27261d8bf4f688089425b0654cbc557b300869fd276a3e2047826f122bb2f655993fc58322563070ceccd8478f647ac321479a332dbb76e3add3210702de7eaa6f8469eb0261c78c90f34bec516c1d15946ea1f30b96f50c65141c95981eaaddf2c0e15f86c7a24841d0d41dff2ca5ebd79325258191c9b9997152183b62d7943415d3dc7ce5fddf116c38b92d7c7568cd9f1203df1fa6b0e9704852b98d251f1992a98743ea448ae5b97966a5f8112c8e9d46bd1dd1f28deef4aa7a887d6d3016790abb39500d810d2138dcd56f7c869f8d84605d1f6290f6b45ee0757f140a60447f69bb4533681c0501ca6369f48b58c2df5dac314878b27ace203635e2d17f9461ebfe23e1d1b0556d05cb381b88c4aa96d65bb733b1458f177bf5fc588b9a6323dbc7c67e1ee30f7bb0da53fa70e9a14d9a84034383ecfeb391020eda6609bab6b0d9a7ca7641ab15a1fcbc68c9813e599077a496a38bc79e86106ab37696121d6250a80cd6036967d62ae5c0be83c4a4bfd250fdcc58d4f55484656ba9f2d2c3d807a5c8a4b822a02caa5acc1d84a1c60886ba2429f9d18e33071cb32aede3655ed28fc7137a82a5f1fac89e0443a11b47d45b69ce4c137d4e67e37a0e12d0e52c0af2a28ac57e55962cd46ea541e4d448981b00efe508d2065f65a08c59cf15213b0cdde7bda631c9373f679e96f4ad554c2155e929f168c6415dbcef8dddc5b7ad118cd70751251c729eba63c6671ecc1d331e1a2b9878f35c352b9c261908b4c1b7cf83ccaa8f6e0b74d27c66ba72cc5bf97ee3cbc4021f06ec8b254b5269f3d98fc914d9421a7a5d23f060b667a9dd4d8f6e95bd1086c6d8179a8fef9fc94d8700ac2ac83c2ceb4366e5e47fff0f45cc8ec95359727c9289203b5afe4948c61602c1cc99301c84b9ff288cf18c06f1937e887577d92aa30b29043ca1ee8dc8694d47b51c44bedfa0243147988fd671f4c89b2c2897183d10a5a590c52400a10f76a4ab9f20317c7b0dcf51a138f566bed3ab3bfb179790f80469a3ba14c0512d95fb115b1ec20082d5ce6d2c6cd3f540e1bcc75705f8ea575c5e80313f7bf04090ab3aa3a3580ebf538a4b8cd49be289a09f7accb1cbad99e0cfd1ddd123571d2ab52c3b63744d63d9bcca2aab7965d42348c5382b8b04ed207e32c1e6242e118e629be9cc8f6688fa78e3e82baf152522087c8fa76350b03ff570f41852a7012f601feb2b1651fff4a05e3a86752505bbb1f1bae0b722e79bf28048a2dad70c4badad63d52257e6839124fc4be3cdc95986adca4cc21e9393663247a83ce0985ef4ca208d7a265f73f2867afb7e056c00f1d37dbbcbcf4a549ac759b6f12719019f9f968f6d4223d064285569e4d2f20c42fc809575b6e1e6b6c1246411fd0c8678645e9c4441ebc421ee44801c470c52bef4e3e952c91c35", &(0x7f0000000000), &(0x7f0000000040)="8408f4374afdf7f3b2f660a2214c864f4caa5ff84e20f1bff239619d1c7101a5d42b2a64f92147f882088510b5b119bb731d199b340e69d4b30366169a3fccb472b20b056b69f5c24354be14266f3c705067788c8c5193d1c445ea06c1ade35d27b1fa0fcdb4c3d6ee6aa3bbd813e46fdb20498bb7631e73872a91c678433b37dcd53f7e9c494ec396b918583aba6e36d18a2e787266f5284471a9dc76653fbd5c936e60f0e4", &(0x7f00000022c0)="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", 0x400, r1}, 0x38) 09:03:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x42, 0x87}, 0x20) 09:03:21 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="183900000300000000000000000000008db05000010000005c528000fcffffff18230000", @ANYRES32=0x1, @ANYBLOB="00000000f8ffffff"], &(0x7f0000000040)='GPL\x00', 0x55ee, 0x60, &(0x7f0000000340)=""/96, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x2, 0xb, 0x88, 0xfffffffa}, 0x10}, 0x78) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000e00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e80)=""/117, 0x75}], 0x1, &(0x7f0000000f40)=""/97, 0x61}, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000001000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x3, [@struct={0x4, 0x3, 0x0, 0x4, 0x1, 0xfff, [{0x2, 0x2, 0x3f}, {0xf, 0x4, 0x3}, {0xa}]}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x74, 0x0, 0x5f, 0x3}, @datasec={0x10, 0x4, 0x0, 0xf, 0x3, [{0x1, 0x2, 0x401}, {0x1, 0x3, 0x401}, {0x5, 0x6, 0x3}, {0x1, 0x9, 0xfff}], "4a3fd6"}, @datasec={0x1, 0x2, 0x0, 0xf, 0x1, [{0x4, 0x8000, 0x400}, {0x2, 0x92, 0x8001}], "df"}, @union={0xe, 0x6, 0x0, 0x5, 0x1, 0x1, [{0x7}, {0x5, 0x5}, {0x8, 0x4, 0x4}, {0x1, 0x0, 0x3ff}, {0x8, 0x5, 0x80000001}, {0xb, 0x1, 0x8f}]}, @fwd={0x8}]}, {0x0, [0x30]}}, &(0x7f0000001140)=""/253, 0x11f, 0xfd}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_tracing={0x1a, 0xb, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000001}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x9, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x4e}, @map={0x18, 0x4, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xf17, 0x78, &(0x7f0000000440)=""/120, 0x41000, 0x8, '\x00', r3, 0x19, r4, 0x8, &(0x7f0000001280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000012c0)={0x4, 0xa, 0x2, 0x8000}, 0x10, 0x1c103, r1}, 0x78) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f00000002c0)={r1, r5}, 0xc) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000004c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0xa, 0x2, 0x6, 0x10000, 0x8, r5, 0x6, '\x00', r3, r0, 0x0, 0x0, 0x5}, 0x40) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000780)={&(0x7f0000000500)="252220b45be789ea05d8940b9766faa3b09594bae09fe72289c8817f1c18f02f4e45ae101aa547c86eb5e18e5d0b7abbb0b752018629695d1f1bc64e46de7730c5d40689aca4c549e296d7e2987787f2cd1d60e8604bbe810de57d32f57c3f5fc2222a0384e8b0a5dfd033b37106f6aca2b98ed7822e2ab8911b57040120d13e4e6abab242b0d983e5d107a07cd244ec0d87b49906062c1f1eb652a116fec8c9e23b2c020fb5a505e7fc35cc4aff694b50fe37da", &(0x7f00000005c0)=""/55, &(0x7f0000000600)="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", &(0x7f0000000700), 0x3, r6, 0x4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000940)={&(0x7f0000000700)="8e", &(0x7f00000007c0)=""/193, &(0x7f00000008c0)="b0b05d194f6c3f", &(0x7f0000000900)="5e0831e72db134aca51f053aff782388ab97ff3da2c1c5fc", 0x0, r5, 0x4}, 0x38) 09:03:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x3f6}, 0x20) 09:03:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='io.stat\x00', 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002980)={&(0x7f00000008c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001940)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1, &(0x7f0000001980)=""/4096, 0x1000}, 0x3) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000029c0)=r2) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x42, 0x87}, 0x20) 09:03:21 executing program 5: sendmsg$sock(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000000)="32d869f904973e26a53edae912795796ccc67d530b62057888c389ace84205105092b95a659487bc0c10720a5a70700e36a10f26d8620e46778262e9d1264ced941054a271210d58d64f9db4429578f31ce2404d153414993f93f765841b0c95b4f147d183634d7afd61228fb4b9f0acc5f696bc3d5f8cb207ad8aeb087de95e8cffd411279c73308d077b856238e6b23e13e21085294b5faac032ccf7ef9ede81582d541a4b8ab378c486a69c846fea9f4ee6c7c16926537d9d8af75e8fcccf542ab769", 0xc4}, {&(0x7f0000000100)="b775ca9d2d516e96c7f7b527d6a86c3c1134dcf97c169b342569cf57be5f08aff283dc3651a58c02612936919e6f887a15f69a8151025c0416b6cb2a9feaea7776b67a4db27c5b41dffe7789f54f3ef4b89e27e92f1123a42e9033cfc9acfab5e7899373ca15b72d0c45517910ca3c849f0ec3c9713accd8dc48e8dfcc8ba00284243ee16981ceeb6f7600b7e066dc1694e0bfdced", 0x95}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000001c0)="e0ea42291eb9cf4db231cd39d5cbb162f75edda8bf46b4396819", 0x1a}, {&(0x7f0000000200)="14e43b166e52ce68d04331bb742943978377427667af608135f4dd172612dba50d6feffb1a481b8cd893b27c52ba71c961123188c55751625167747d72f1634e5d98936200c0e0423df5fb37c9871f1f66cf", 0x52}, {&(0x7f00000012c0)="e40858b2844cdd58407e9b0c934d4829cc91739ff4d808213e2b8ce4e45464d625056ee8e7e17a5082c81246145923e590d66634cc8b1a39f49a95b9192db0f2671b0e5d9129f79384d68c8ec1bfe2602d360940338843a87f30b6f69f10b76449e5827978ac94802ea5eabeb2010d6c97903d3638090ff0a2c54466ac4744fb68596f68bc374084168548e4d241a499a87eea4403a83a0b9bc614cf47fad4b68b52829db68dd7f903f311f5", 0xac}, {&(0x7f0000001380)="ed1d76fa753d47042674dc5dd24d798c1f3177576d684db2706e261ab4cd40fc684f0346b6e41d09b563264260f3b10a1626c7174144e1974c2f299b600f82ff866891152644a585b9b274d0650b654da8f7a6e6cd011b565450a198", 0x5c}], 0x7, &(0x7f0000001480)=[@txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x8112}}, @txtime={{0x18, 0x1, 0x3d, 0x800}}], 0x48}, 0x10) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x61}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001580)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000015c0)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000001600)=r0, 0x4) 09:03:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x3fe}, 0x20) 09:03:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x9d, 0x8001, 0xf, 0x0, 0xffffffffffffffff, 0x101, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3}, 0x40) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000008200)={&(0x7f0000007e40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f0000008180)=[{&(0x7f0000007ec0)=""/134, 0x86}, {&(0x7f0000007f80)=""/215, 0xd7}, {&(0x7f0000008080)=""/217, 0xd9}], 0x3, &(0x7f00000081c0)=""/44, 0x2c}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000082c0)={0x1, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x8, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x31}, @generic={0x2, 0x6, 0xa, 0x6, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x401, 0x42, &(0x7f00000000c0)=""/66, 0x41100, 0x4, '\x00', r1, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000008240)={0x9, 0x3}, 0x8, 0x10, &(0x7f0000008280)={0x3, 0x2, 0x6, 0x4}, 0x10, 0xffffffffffffffff}, 0x78) 09:03:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x5}}, @struct={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000140)=""/135, 0x42, 0x87}, 0x20) 09:03:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0xffffff}, 0x20) 09:03:21 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x8, 0x5e34, 0x400, 0x0, 0x40, r0, 0x596, '\x00', 0x0, r0, 0x1, 0x0, 0x5}, 0x40) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x1, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000c80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000d00)=""/29, 0x1d}, {&(0x7f0000000d40)=""/129, 0x81}, {&(0x7f0000000e00)=""/217, 0xd9}], 0x3, &(0x7f0000000f40)=""/249, 0xf9}, 0x61) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001100)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x6, 0xe, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, [@exit, @call={0x85, 0x0, 0x0, 0x63}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80}, @map={0x18, 0x6}, @exit, @exit, @exit]}, &(0x7f0000000300)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x1f00, 0x8, '\x00', r2, 0x5, r0, 0x8, &(0x7f0000001080)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000010c0)={0x1, 0x8, 0x6, 0x3}, 0x10, 0x0, r3}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000050000000000fdff04000000850000001b00000095db000001000000"], &(0x7f0000000080)='GPL\x00', 0x1a, 0x61, &(0x7f00000000c0)=""/97, 0x40f00, 0x16, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x5, 0x800}, 0x10, 0xffffffffffffffff}, 0x78) 09:03:21 executing program 5: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0xffffff1f}, 0x20) 09:03:21 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="183900000300000000000000000000008db05000010000005c528000fcffffff18230000", @ANYRES32=0x1, @ANYBLOB="00000000f8ffffff"], &(0x7f0000000040)='GPL\x00', 0x55ee, 0x60, &(0x7f0000000340)=""/96, 0x41100, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000080)={0x2, 0xb, 0x88, 0xfffffffa}, 0x10}, 0x78) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00'}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000e00)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e80)=""/117, 0x75}], 0x1, &(0x7f0000000f40)=""/97, 0x61}, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f0000001000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x3, [@struct={0x4, 0x3, 0x0, 0x4, 0x1, 0xfff, [{0x2, 0x2, 0x3f}, {0xf, 0x4, 0x3}, {0xa}]}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x74, 0x0, 0x5f, 0x3}, @datasec={0x10, 0x4, 0x0, 0xf, 0x3, [{0x1, 0x2, 0x401}, {0x1, 0x3, 0x401}, {0x5, 0x6, 0x3}, {0x1, 0x9, 0xfff}], "4a3fd6"}, @datasec={0x1, 0x2, 0x0, 0xf, 0x1, [{0x4, 0x8000, 0x400}, {0x2, 0x92, 0x8001}], "df"}, @union={0xe, 0x6, 0x0, 0x5, 0x1, 0x1, [{0x7}, {0x5, 0x5}, {0x8, 0x4, 0x4}, {0x1, 0x0, 0x3ff}, {0x8, 0x5, 0x80000001}, {0xb, 0x1, 0x8f}]}, @fwd={0x8}]}, {0x0, [0x30]}}, &(0x7f0000001140)=""/253, 0x11f, 0xfd}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001300)=@bpf_tracing={0x1a, 0xb, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000001}, [@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, @map={0x18, 0x9, 0x1, 0x0, r2}, @call={0x85, 0x0, 0x0, 0x4e}, @map={0x18, 0x4, 0x1, 0x0, 0x1}]}, &(0x7f0000000140)='syzkaller\x00', 0xf17, 0x78, &(0x7f0000000440)=""/120, 0x41000, 0x8, '\x00', r3, 0x19, r4, 0x8, &(0x7f0000001280)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000012c0)={0x4, 0xa, 0x2, 0x8000}, 0x10, 0x1c103, r1}, 0x78) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f00000002c0)={r1, r5}, 0xc) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f00000004c0)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0xa, 0x2, 0x6, 0x10000, 0x8, r5, 0x6, '\x00', r3, r0, 0x0, 0x0, 0x5}, 0x40) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000780)={&(0x7f0000000500)="252220b45be789ea05d8940b9766faa3b09594bae09fe72289c8817f1c18f02f4e45ae101aa547c86eb5e18e5d0b7abbb0b752018629695d1f1bc64e46de7730c5d40689aca4c549e296d7e2987787f2cd1d60e8604bbe810de57d32f57c3f5fc2222a0384e8b0a5dfd033b37106f6aca2b98ed7822e2ab8911b57040120d13e4e6abab242b0d983e5d107a07cd244ec0d87b49906062c1f1eb652a116fec8c9e23b2c020fb5a505e7fc35cc4aff694b50fe37da", &(0x7f00000005c0)=""/55, &(0x7f0000000600)="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", &(0x7f0000000700), 0x3, r6, 0x4}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000940)={&(0x7f0000000700)="8e", &(0x7f00000007c0)=""/193, &(0x7f00000008c0)="b0b05d194f6c3f", &(0x7f0000000900)="5e0831e72db134aca51f053aff782388ab97ff3da2c1c5fc", 0x0, r5, 0x4}, 0x38) 09:03:22 executing program 0: recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000140)=""/31, 0x1f}, {&(0x7f0000000180)=""/98, 0x62}], 0x2, &(0x7f00000002c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0xa8}, 0x40000020) recvmsg$unix(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000380), 0x6e, &(0x7f0000000640)=[{&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/180, 0xb4}, {&(0x7f0000000540)=""/252, 0xfc}], 0x3, &(0x7f0000000680)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x2000, &(0x7f0000000800)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0xffff}}], [{@uid_eq={'uid', 0x3d, r0}}, {@euid_gt={'euid>', r1}}, {@fsname}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@hash}, {@dont_measure}, {@smackfshat={'smackfshat', 0x3d, '\\\x84'}}]}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0xb1db) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 09:03:22 executing program 5: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000040)=r0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kvm_halt_poll_ns\x00', r0}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000300)={r1}) r2 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) recvmsg$unix(r1, &(0x7f0000000240)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2, &(0x7f00000014c0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000000000001000000020000009d03be2154bef2b105e278086a53431d7bd95128f67df15974bd56baf675f15b74b8b35c348444233ce76a2297b1571c359add4db8166b8478514149cb1b57ce11b47fbf6400bd7e2fc6ac9ea6bd41f9ffffff31e1df4782a191110179066f9c555297a6607a2e017362601c6bc2cf0a2f454f8b279fc2c7947465f0155897faba281ff4fe53289e151163d33390ffd7d62e2d410517cecde078b12dffa6b39cf3506851d7e6b494478b7fadc572a9f5d88d75c79d8b24b7d5b8aa83c74f2f33465c4e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x90}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000001640)={0x14, 0x4, &(0x7f0000001340)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x0, 0x0, 0x1}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000001380)='syzkaller\x00', 0x1f, 0x1b, &(0x7f00000013c0)=""/27, 0x7a27fcda92ffd910, 0x4, '\x00', 0x0, 0xd, r2, 0x8, &(0x7f0000001440)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x1, 0x2, 0x4, 0xe1}, 0x10, 0xffffffffffffffff, r0}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000001400)={0xf, 0x0, 0x40, 0x8, 0x800, r3, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x40) 09:03:22 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x8, 0x5e34, 0x400, 0x0, 0x40, r0, 0x596, '\x00', 0x0, r0, 0x1, 0x0, 0x5}, 0x40) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x1, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=r1, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000c80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000d00)=""/29, 0x1d}, {&(0x7f0000000d40)=""/129, 0x81}, {&(0x7f0000000e00)=""/217, 0xd9}], 0x3, &(0x7f0000000f40)=""/249, 0xf9}, 0x61) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001100)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x6, 0xe, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}, [@exit, @call={0x85, 0x0, 0x0, 0x63}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80}, @map={0x18, 0x6}, @exit, @exit, @exit]}, &(0x7f0000000300)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x1f00, 0x8, '\x00', r2, 0x5, r0, 0x8, &(0x7f0000001080)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000010c0)={0x1, 0x8, 0x6, 0x3}, 0x10, 0x0, r3}, 0x78) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000050000000000fdff04000000850000001b00000095db000001000000"], &(0x7f0000000080)='GPL\x00', 0x1a, 0x61, &(0x7f00000000c0)=""/97, 0x40f00, 0x16, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xc, 0x5, 0x800}, 0x10, 0xffffffffffffffff}, 0x78) 09:03:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:22 executing program 0: socketpair(0x22, 0x1, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x0) socketpair(0x2a, 0xa, 0x400, &(0x7f0000001780)) sendmsg$inet(r1, &(0x7f0000001740)={&(0x7f0000001540)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000001580)="2669e81f9285c361576f6776a661b9f67ca998fabe7f3a40a8f0341725bf8b358d22704472903e5f2fee950a81ff1c021dace3b151a79687a083707f65cc2273ef3e8dca6ba5a9dbe605d8e72b461b538cb2ab96f76e67b683d2a6331dfd94b6a2e37991af5581bd12c874d75c6c3d11a93e1ec10f2094036ab6e6467fb9c4737cdcbef65906ba", 0x87}, {&(0x7f0000001640)="009917ba0fd0e0297b7d5bf90fad5dead9557305cd479325e7c3c160f4c978e2a93f1b5dbe22304bce9f51bb58fe66b2708b16417cc9795317c983a86b211b95bc445ac2fe11504d8c583ab15eab6a81aa2530509f52cba1d2", 0x59}], 0x2, &(0x7f0000001700)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x9}}], 0x18}, 0x44080) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@tipc=@name, 0x80, &(0x7f0000000180)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/192, 0xc0}], 0x2, &(0x7f00000012c0)=""/210, 0xd2}, 0x40012000) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x0, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="067203000200000018340000050000000000000000000000425ae0fff0ffffff"], &(0x7f0000000240)='syzkaller\x00', 0xffffff80, 0x64, &(0x7f00000013c0)=""/100, 0x41100, 0xb, '\x00', 0x0, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000001440)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000001480)={0x2, 0xc, 0x6, 0x1f}, 0x10, 0xffffffffffffffff}, 0x78) 09:03:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0xf) 09:03:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:22 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x20) socket$kcm(0x29, 0x5, 0x0) 09:03:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x25) 09:03:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0xb100, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, &(0x7f00000001c0)=""/178, 0x26, 0xb2, 0x1}, 0x20) 09:03:22 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x6, 0x7, 0x20, 0xe2, 0x0, 0x6, 0x4004, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x3, @perf_config_ext={0x8001, 0x1ff}, 0x0, 0x1000200000, 0x8000, 0x2, 0x2, 0x7, 0xea1, 0x0, 0x2, 0x0, 0xc0}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000c80)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r4, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r6 = getpid() sendmsg$unix(r5, &(0x7f00000019c0)={&(0x7f0000000440)=@abs, 0x6e, &(0x7f00000015c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {r6, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x40}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002980)={&(0x7f00000016c0)=@abs, 0x6e, &(0x7f00000028c0)=[{&(0x7f0000001740)=""/106, 0x6a}, {&(0x7f00000017c0)=""/27, 0x1b}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000002800)=""/173, 0xad}], 0x4, &(0x7f0000002900)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x2000) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002e80)={&(0x7f00000029c0)=@abs, 0x6e, &(0x7f0000002d00)=[{&(0x7f0000002a40)=""/92, 0x5c}, {&(0x7f0000002ac0)=""/141, 0x8d}, {&(0x7f0000002b80)=""/52, 0x34}, {&(0x7f0000002bc0)=""/103, 0x67}, {&(0x7f0000002c40)=""/135, 0x87}], 0x5, &(0x7f0000002d80)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0xe0}, 0x40000000) recvmsg$unix(0xffffffffffffffff, &(0x7f00000043c0)={&(0x7f0000002ec0), 0x6e, &(0x7f0000004300)=[{&(0x7f0000002f40)=""/164, 0xa4}, {&(0x7f0000003000)=""/65, 0x41}, {&(0x7f0000003080)=""/201, 0xc9}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/135, 0x87}, {&(0x7f0000004240)=""/187, 0xbb}], 0x6, &(0x7f0000004380)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x20}, 0x2041) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000004400)={0xffffffffffffffff}) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000004440), 0x8) r12 = perf_event_open(&(0x7f0000004480)={0x1, 0x80, 0x66, 0x8, 0x5, 0x40, 0x0, 0x800, 0x14000, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x7, @perf_config_ext={0x81, 0x9}, 0x4c, 0x2, 0x5, 0x2, 0x1, 0x2, 0x7, 0x0, 0x1ff, 0x0, 0x7ff}, 0x0, 0x4, 0xffffffffffffffff, 0x2) sendmsg$unix(r1, &(0x7f00000045c0)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000300)=[{&(0x7f00000000c0)="7ae2bd9157593018b58074329f678e0111dc5d26b74a6c0ef58f754649e53bc3155cd06486f9900da7b4191ffc279e5ddb3254b729c38f0008649595566eba575a7b67005af56fac29c207e10d0c45cccb0f09cc447df64d3d2b1bf172718973f45c7a3dd8ec2e126b39a7e5eb143c5b700444be9b2d139b5e676b2324f8399ab3432d1e1fab7e90aa744683eccbedd9e24a976ee2f44740e97bacdb97ff55ae26d547d9bc58f386b8dee4bc51505128480362e382edd604a01e6a27c52820f04f47a04d3c8c119d913080de6198dddc3d57e64bacaa856dcc3d69eba94cadc7da6b940c364206286ecb263c93", 0xed}, {&(0x7f00000001c0)="05a6b98f289bc68901c7db063536983784f92558a12e2121ad8d692465bf759210129315ae8cf40d666e97dfb618b8d04adcf8b5f5c8feeccd599032c479ace862bc1a12fc283b8e3e889460a29db8af5e5539c354", 0x55}, {&(0x7f0000000240)="a669dfc396cad11a74c53d370b893bbe375162cac34580aabde167a1c6ffa616423b7e44908782", 0x27}, {&(0x7f00000002c0)="ec7914ae1b5c54705175b3cb8ced896fabf75b8e7d7bec364d20b76b83b84779b6d613f838f35847", 0x28}], 0x4, &(0x7f0000004500)=[@rights={{0x1c, 0x1, 0x1, [r2, r3, r4]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r9}}}, @rights={{0x24, 0x1, 0x1, [r10, r11, r12, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee00, 0xffffffffffffffff}}}], 0xa8, 0x90}, 0x0) 09:03:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) sendmsg$sock(r0, &(0x7f0000002400)={&(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x1, {{0x40, 0x2}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="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