, 0x80, 0x5de, 0x400, 0x3f, 0x2, 0x80000000, 0x0, 0x6c10aa5a, 0x4, @perf_bp={&(0x7f0000000080), 0x9}, 0x2000, 0x41d, 0x400, 0x0, 0x0, 0x7, 0x98}, r1, 0x3, r0, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6612, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) [ 378.552931] FAULT_INJECTION: forcing a failure. [ 378.552931] name failslab, interval 1, probability 0, space 0, times 0 [ 378.581360] CPU: 1 PID: 22873 Comm: syz-executor3 Not tainted 4.20.0-rc1+ #81 [ 378.588659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.598018] Call Trace: [ 378.600640] dump_stack+0x244/0x39d [ 378.604297] ? dump_stack_print_info.cold.1+0x20/0x20 [ 378.609514] ? find_held_lock+0x36/0x1c0 [ 378.613589] ? print_usage_bug+0xc0/0xc0 [ 378.617671] should_fail.cold.4+0xa/0x17 [ 378.621751] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 378.626867] ? mark_held_locks+0x130/0x130 [ 378.631130] ? zap_class+0x640/0x640 [ 378.634865] ? mark_held_locks+0x130/0x130 [ 378.639115] ? __lock_acquire+0x62f/0x4c20 [ 378.643364] ? find_held_lock+0x36/0x1c0 [ 378.647437] ? __lock_is_held+0xb5/0x140 [ 378.651528] ? perf_trace_sched_process_exec+0x860/0x860 [ 378.656991] ? __lock_acquire+0x62f/0x4c20 [ 378.661268] __should_failslab+0x124/0x180 [ 378.665520] should_failslab+0x9/0x14 [ 378.669335] kmem_cache_alloc+0x2be/0x730 [ 378.673497] ? is_bpf_text_address+0xac/0x170 [ 378.678011] __d_alloc+0xc8/0xb90 [ 378.681496] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 378.686529] ? __lock_acquire+0x62f/0x4c20 [ 378.690768] ? __lock_acquire+0x62f/0x4c20 [ 378.690786] ? kernfs_iop_permission+0x65/0xb0 [ 378.690825] ? mark_held_locks+0x130/0x130 [ 378.703849] ? mark_held_locks+0x130/0x130 [ 378.708100] ? print_usage_bug+0xc0/0xc0 [ 378.712176] ? zap_class+0x640/0x640 [ 378.716440] ? zap_class+0x640/0x640 [ 378.720176] d_alloc+0x96/0x380 [ 378.723463] ? __d_alloc+0xb90/0xb90 [ 378.727195] ? find_held_lock+0x36/0x1c0 [ 378.731278] d_alloc_parallel+0x15a/0x1f40 [ 378.735530] ? __d_lookup+0x591/0x9e0 [ 378.739347] ? lock_downgrade+0x900/0x900 [ 378.743508] ? check_preemption_disabled+0x48/0x280 [ 378.748543] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 378.753487] ? kasan_check_read+0x11/0x20 [ 378.757660] ? __d_lookup_rcu+0xaa0/0xaa0 [ 378.761836] ? __d_lookup+0x5b8/0x9e0 [ 378.765674] ? d_alloc_parallel+0x1f40/0x1f40 [ 378.770179] ? d_lookup+0x255/0x300 [ 378.773833] ? d_lookup+0x255/0x300 [ 378.777475] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 378.782082] ? kasan_check_read+0x11/0x20 [ 378.786248] ? lookup_open+0x302/0x1b90 [ 378.790242] ? trace_hardirqs_off_caller+0x310/0x310 [ 378.795362] ? __lockdep_init_map+0x105/0x590 [ 378.799879] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 378.804912] ? d_lookup+0x20d/0x300 [ 378.808557] ? __d_lookup+0x9e0/0x9e0 [ 378.812383] lookup_open+0x560/0x1b90 [ 378.816217] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 378.822160] path_openat+0x2464/0x5150 [ 378.826069] ? rcu_softirq_qs+0x20/0x20 [ 378.830064] ? unwind_dump+0x190/0x190 [ 378.833980] ? path_lookupat.isra.43+0xc00/0xc00 [ 378.838753] ? unwind_get_return_address+0x61/0xa0 [ 378.843691] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 378.848713] ? expand_files.part.8+0x571/0x9a0 [ 378.848737] ? find_held_lock+0x36/0x1c0 [ 378.848760] ? __alloc_fd+0x347/0x6e0 [ 378.861185] ? lock_downgrade+0x900/0x900 [ 378.865347] ? getname+0x19/0x20 [ 378.868738] ? kasan_check_read+0x11/0x20 [ 378.872900] ? do_raw_spin_unlock+0xa7/0x330 [ 378.877324] ? do_raw_spin_trylock+0x270/0x270 [ 378.877341] ? __lock_is_held+0xb5/0x140 [ 378.877361] ? __check_object_size+0xb1/0x782 [ 378.886001] ? _raw_spin_unlock+0x2c/0x50 [ 378.886018] ? __alloc_fd+0x347/0x6e0 [ 378.886057] do_filp_open+0x255/0x380 12:06:16 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4a, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:16 executing program 5: r0 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="160000001a0081aee4050c00000f00fe078bc36f1600", 0x16}], 0x1, &(0x7f0000000080)}, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000180)=r1, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) recvmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000280)=@l2, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/139, 0x8b}, 0x0) socketpair(0x11, 0x4, 0x401, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) 12:06:16 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuacct.usage_]ercpu\x00', 0x2761, 0x0) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r1, 0x50, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x6612, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000080)) 12:06:16 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000007000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) [ 378.902248] ? may_open_dev+0x100/0x100 [ 378.906237] ? strncpy_from_user+0x411/0x5a0 [ 378.910670] ? digsig_verify+0x1530/0x1530 [ 378.914929] ? get_unused_fd_flags+0x122/0x1a0 [ 378.919534] ? getname_flags+0x26e/0x590 [ 378.923628] do_sys_open+0x568/0x700 [ 378.927359] ? filp_open+0x80/0x80 [ 378.930912] ? __ia32_sys_read+0xb0/0xb0 [ 378.934994] ? trace_hardirqs_off_caller+0x310/0x310 [ 378.940124] __x64_sys_openat+0x9d/0x100 [ 378.944203] do_syscall_64+0x1b9/0x820 [ 378.948109] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 378.953485] ? syscall_return_slowpath+0x5e0/0x5e0 [ 378.958421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.963280] ? trace_hardirqs_on_caller+0x310/0x310 [ 378.968310] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 378.973341] ? prepare_exit_to_usermode+0x291/0x3b0 [ 378.978380] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.983239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.988429] RIP: 0033:0x457569 [ 378.991622] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.010520] RSP: 002b:00007f116c5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 379.018228] RAX: ffffffffffffffda RBX: 00007f116c5dec90 RCX: 0000000000457569 [ 379.025500] RDX: 0000000000000002 RSI: 0000000020000240 RDI: 0000000000000003 [ 379.032771] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 379.040049] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f116c5df6d4 [ 379.047319] R13: 00000000004c2da7 R14: 00000000004d4758 R15: 0000000000000004 12:06:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4b, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea97", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6612, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) 12:06:17 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681ba0008000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:17 executing program 3 (fault-call:1 fault-nth:5): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4b, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea97", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'gre0\x00', 0x200}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6612, 0x0) [ 379.231360] FAULT_INJECTION: forcing a failure. [ 379.231360] name failslab, interval 1, probability 0, space 0, times 0 [ 379.271207] CPU: 0 PID: 22913 Comm: syz-executor3 Not tainted 4.20.0-rc1+ #81 12:06:17 executing program 5: [ 379.278547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.287918] Call Trace: [ 379.290522] dump_stack+0x244/0x39d [ 379.294153] ? dump_stack_print_info.cold.1+0x20/0x20 [ 379.299335] ? kernfs_iop_lookup+0x4f/0x230 [ 379.303652] should_fail.cold.4+0xa/0x17 [ 379.307702] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 379.312805] ? __mutex_lock+0x85e/0x16f0 [ 379.316877] ? zap_class+0x640/0x640 [ 379.320583] ? find_held_lock+0x36/0x1c0 [ 379.324637] ? find_held_lock+0x36/0x1c0 [ 379.328700] ? __lock_is_held+0xb5/0x140 [ 379.332776] ? perf_trace_sched_process_exec+0x860/0x860 [ 379.338228] ? iget_locked+0xe2/0x5b0 [ 379.342030] ? lock_downgrade+0x900/0x900 [ 379.346171] __should_failslab+0x124/0x180 [ 379.350411] should_failslab+0x9/0x14 [ 379.354213] kmem_cache_alloc+0x2be/0x730 [ 379.358352] ? d_lookup+0x255/0x300 [ 379.361971] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 379.366975] ? find_inode_fast.isra.19+0x17f/0x240 [ 379.371902] alloc_inode+0xb2/0x190 [ 379.375515] iget_locked+0x218/0x5b0 [ 379.379219] ? inode_insert5+0x540/0x540 [ 379.383274] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 379.388818] ? kernfs_active+0x12f/0x1c0 [ 379.392870] ? kernfs_path_from_node+0x60/0x60 [ 379.397448] kernfs_get_inode+0x51/0x570 [ 379.401517] kernfs_iop_lookup+0x1a7/0x230 [ 379.405754] ? kernfs_find_and_get_ns+0x70/0x70 [ 379.410428] lookup_open+0x72e/0x1b90 [ 379.414231] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 379.420128] path_openat+0x2464/0x5150 [ 379.424010] ? rcu_softirq_qs+0x20/0x20 [ 379.427997] ? unwind_dump+0x190/0x190 [ 379.431897] ? path_lookupat.isra.43+0xc00/0xc00 [ 379.436643] ? unwind_get_return_address+0x61/0xa0 [ 379.441564] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 379.446577] ? expand_files.part.8+0x571/0x9a0 [ 379.451173] ? find_held_lock+0x36/0x1c0 [ 379.455231] ? __alloc_fd+0x347/0x6e0 [ 379.459045] ? lock_downgrade+0x900/0x900 [ 379.463217] ? getname+0x19/0x20 [ 379.466580] ? kasan_check_read+0x11/0x20 [ 379.470719] ? do_raw_spin_unlock+0xa7/0x330 [ 379.475118] ? do_raw_spin_trylock+0x270/0x270 [ 379.479693] ? __lock_is_held+0xb5/0x140 [ 379.483741] ? __check_object_size+0xb1/0x782 [ 379.488233] ? _raw_spin_unlock+0x2c/0x50 [ 379.492371] ? __alloc_fd+0x347/0x6e0 [ 379.496164] do_filp_open+0x255/0x380 [ 379.499956] ? may_open_dev+0x100/0x100 [ 379.503918] ? strncpy_from_user+0x411/0x5a0 [ 379.508324] ? digsig_verify+0x1530/0x1530 [ 379.512549] ? get_unused_fd_flags+0x122/0x1a0 [ 379.517154] ? getname_flags+0x26e/0x590 [ 379.521221] do_sys_open+0x568/0x700 [ 379.524927] ? filp_open+0x80/0x80 [ 379.528452] ? __ia32_sys_read+0xb0/0xb0 [ 379.532505] ? trace_hardirqs_off_caller+0x310/0x310 [ 379.537607] __x64_sys_openat+0x9d/0x100 [ 379.541663] do_syscall_64+0x1b9/0x820 [ 379.545553] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 379.550911] ? syscall_return_slowpath+0x5e0/0x5e0 [ 379.555830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.560684] ? trace_hardirqs_on_caller+0x310/0x310 [ 379.565722] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 379.570728] ? prepare_exit_to_usermode+0x291/0x3b0 [ 379.575734] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.580571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.585750] RIP: 0033:0x457569 [ 379.588942] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 379.607853] RSP: 002b:00007f116c5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 379.615552] RAX: ffffffffffffffda RBX: 00007f116c5dec90 RCX: 0000000000457569 [ 379.622845] RDX: 0000000000000002 RSI: 0000000020000240 RDI: 0000000000000003 12:06:17 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000e0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 379.630111] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 379.637366] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f116c5df6d4 [ 379.644620] R13: 00000000004c2da7 R14: 00000000004d4758 R15: 0000000000000004 12:06:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) r1 = socket$kcm(0x11, 0x3, 0x300) recvmsg(r1, &(0x7f0000002580)={&(0x7f0000001f40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000002500)=[{&(0x7f0000001fc0)=""/225, 0xe1}, {&(0x7f00000020c0)=""/124, 0x7c}, {&(0x7f0000002140)=""/213, 0xd5}, {&(0x7f0000002240)=""/214, 0xd6}, {&(0x7f0000002440)=""/24, 0x18}, {&(0x7f0000002480)=""/70, 0x46}], 0x6, 0x0, 0x0, 0x8}, 0x20) sendmsg$kcm(r1, &(0x7f0000005e80)={&(0x7f00000025c0)=@can={0x1d, r2}, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000004a00)}], 0x1, &(0x7f0000004b40)=[{0x10, 0x114}], 0x10, 0x20000000}, 0x0) sendmsg$kcm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)="c2882cf20c85c3a2a39a2fc7e544cece9fd8bf0bb1e605d58ee68a07f94e6eb52c33a270d9a196d53ac54c9666389214f3009af16ff5502d5e4f936e289f7a6564e8ef840bc72d984c4ef22f450d159b17dd49bc3b9d02e35ae40c3c9c218abefbc6a02e5b9b5cf0d31115c797d6b53110b7651c4700e6b4d28e69c5e312052b5bde0b5cedf660d5130ef2bc41", 0x8d}], 0x1, 0x0, 0x0, 0x20000000}, 0x4004040) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x541b, 0x70d000) sendmsg$kcm(r1, &(0x7f0000001b40)={&(0x7f0000000500)=@nfc_llcp={0x27, 0x1, 0x1, 0x3, 0x4, 0x81, "330dfeac03be7f9c0e86501a4af73a141510a2e269721d29bf5efb331a212b0e77732053626c449862f788c70b06d50b08c8cc365c6ca7ef5594f7dc9eaeb5", 0x1b}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000600)="b4290bdac7af8cc6b17d2f983ff6c5904e54cb8c738491de4aee4eeb36de8b5511fa894cd038d9629f00bfde37fa6e64a3734b3969467d59828405be3e9d3e4d26e6f7d8f8c867bfbe51b0735daa976b1ef4735442ad85274fb95802134d5173cb575744edabe5263bace899da740a9d91bdb56e3a29672c3e51e1a615f88f45b6f46c1490d8e86771ea1f0a6fc72b", 0x8f}], 0x1, &(0x7f0000000780)=[{0x88, 0x18c, 0x4, "30dfe7fcae80e9880fe72b7b4e98f32e78cb6550f1bbdbf57af4a82be5d146b37867f9da00a4aac073af16fb8488e7dfecdeb2fe09fc7bf09a8470b05bc701f7ba68556ff33183a8b2c5142fea1ee392bac56c6b7209b26c4e8a6e9b973a662c4ba4b238491790bf87e63a8c936bac77b4fdb36334e6"}], 0x88, 0x1}, 0xc1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x6612, 0x0) 12:06:17 executing program 3 (fault-call:1 fault-nth:6): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4b, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea97", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 379.848813] protocol 0004 is buggy, dev gre0 [ 379.854262] FAULT_INJECTION: forcing a failure. [ 379.854262] name failslab, interval 1, probability 0, space 0, times 0 [ 379.885510] protocol 0004 is buggy, dev gre0 [ 379.890549] protocol 0004 is buggy, dev gre0 [ 379.895668] protocol 0004 is buggy, dev gre0 [ 379.903239] protocol 0004 is buggy, dev gre0 [ 379.907730] CPU: 1 PID: 22938 Comm: syz-executor3 Not tainted 4.20.0-rc1+ #81 [ 379.907757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.916469] protocol 0004 is buggy, dev gre0 [ 379.924366] Call Trace: [ 379.924394] dump_stack+0x244/0x39d [ 379.924416] ? dump_stack_print_info.cold.1+0x20/0x20 [ 379.924436] ? trace_hardirqs_off_caller+0x310/0x310 [ 379.924461] should_fail.cold.4+0xa/0x17 [ 379.924484] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 379.929888] protocol 0004 is buggy, dev gre0 [ 379.931483] ? zap_class+0x640/0x640 [ 379.931504] ? lock_acquire+0x1ed/0x520 [ 379.935391] protocol 0004 is buggy, dev gre0 [ 379.940308] ? kernfs_iop_permission+0x65/0xb0 [ 379.940334] ? find_held_lock+0x36/0x1c0 [ 379.940357] ? __lock_is_held+0xb5/0x140 [ 379.940391] ? perf_trace_sched_process_exec+0x860/0x860 [ 379.989230] __should_failslab+0x124/0x180 [ 379.993489] should_failslab+0x9/0x14 [ 379.997309] kmem_cache_alloc_trace+0x2d7/0x750 [ 380.002006] kernfs_fop_open+0x358/0xf80 [ 380.002033] ? fsnotify+0x4e5/0xf20 [ 380.002056] ? kernfs_fop_release+0x1a0/0x1a0 [ 380.009739] ? fsnotify_first_mark+0x350/0x350 [ 380.009754] ? __fsnotify_parent+0xcc/0x420 [ 380.009771] ? apparmor_capable+0x6c0/0x6c0 [ 380.009786] ? fsnotify+0xf20/0xf20 [ 380.009816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.036646] ? may_umount_tree+0x210/0x210 [ 380.040885] ? _copy_to_user+0x110/0x110 [ 380.044941] do_dentry_open+0x499/0x1250 [ 380.048996] ? kernfs_fop_release+0x1a0/0x1a0 [ 380.053489] ? chown_common+0x730/0x730 [ 380.057452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.062978] ? security_inode_permission+0xd2/0x100 [ 380.067984] ? inode_permission+0xb2/0x560 [ 380.072208] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 380.077386] vfs_open+0xa0/0xd0 [ 380.080657] path_openat+0x12bc/0x5150 [ 380.084529] ? rcu_softirq_qs+0x20/0x20 [ 380.088489] ? unwind_dump+0x190/0x190 [ 380.092370] ? path_lookupat.isra.43+0xc00/0xc00 [ 380.097128] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 380.102149] ? expand_files.part.8+0x571/0x9a0 [ 380.106727] ? find_held_lock+0x36/0x1c0 [ 380.110779] ? __alloc_fd+0x347/0x6e0 [ 380.114572] ? lock_downgrade+0x900/0x900 [ 380.118706] ? getname+0x19/0x20 [ 380.122063] ? kasan_check_read+0x11/0x20 [ 380.126199] ? do_raw_spin_unlock+0xa7/0x330 [ 380.130593] ? do_raw_spin_trylock+0x270/0x270 [ 380.135165] ? __lock_is_held+0xb5/0x140 [ 380.139211] ? __check_object_size+0xb1/0x782 [ 380.143700] ? _raw_spin_unlock+0x2c/0x50 [ 380.147847] ? __alloc_fd+0x347/0x6e0 [ 380.151653] do_filp_open+0x255/0x380 [ 380.155441] ? may_open_dev+0x100/0x100 [ 380.159420] ? strncpy_from_user+0x411/0x5a0 [ 380.163823] ? digsig_verify+0x1530/0x1530 [ 380.168057] ? get_unused_fd_flags+0x122/0x1a0 [ 380.172718] ? getname_flags+0x26e/0x590 [ 380.176784] do_sys_open+0x568/0x700 [ 380.180508] ? filp_open+0x80/0x80 [ 380.184041] ? __ia32_sys_read+0xb0/0xb0 [ 380.188097] ? trace_hardirqs_off_caller+0x310/0x310 [ 380.193189] __x64_sys_openat+0x9d/0x100 [ 380.197242] do_syscall_64+0x1b9/0x820 [ 380.201116] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 380.206467] ? syscall_return_slowpath+0x5e0/0x5e0 [ 380.211392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.216253] ? trace_hardirqs_on_caller+0x310/0x310 [ 380.221258] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 380.226260] ? prepare_exit_to_usermode+0x291/0x3b0 [ 380.231266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.236098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.241275] RIP: 0033:0x457569 [ 380.244458] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.263347] RSP: 002b:00007f116c5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 380.271048] RAX: ffffffffffffffda RBX: 00007f116c5dec90 RCX: 0000000000457569 [ 380.278312] RDX: 0000000000000002 RSI: 0000000020000240 RDI: 0000000000000003 [ 380.285571] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 380.292825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f116c5df6d4 12:06:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) 12:06:18 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b60000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:18 executing program 5: 12:06:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41}, 0x28) 12:06:18 executing program 3 (fault-call:1 fault-nth:7): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 380.300078] R13: 00000000004c2da7 R14: 00000000004d4758 R15: 0000000000000004 12:06:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41}, 0x28) 12:06:18 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b09000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:18 executing program 4: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x70, 0x218ecb4, 0x6, 0x7904800000000, 0x63, 0x0, 0x8, 0x2080, 0x6, 0x200, 0xe000000000000, 0x5, 0x7, 0x2, 0x6, 0x2, 0x0, 0x401, 0xcaee, 0xfffffffffffffff7, 0x80000001, 0xffffffffffff8000, 0x3a6, 0x4, 0x1, 0x80000000, 0xa6, 0x2, 0x4, 0x0, 0x10001, 0xe7a, 0x6, 0x1, 0x7ff, 0xc05c, 0x3, 0x0, 0xf, 0x0, @perf_config_ext={0x100000000, 0x4}, 0x0, 0x100000000, 0x9, 0x0, 0x7, 0x1d, 0x1}, r1, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x00') r3 = openat$cgroup_ro(r1, &(0x7f0000000140)="2f026a6f75702e7374617000", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x6612, 0x0) [ 380.511014] FAULT_INJECTION: forcing a failure. [ 380.511014] name failslab, interval 1, probability 0, space 0, times 0 [ 380.549582] CPU: 0 PID: 22961 Comm: syz-executor3 Not tainted 4.20.0-rc1+ #81 [ 380.556932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.566305] Call Trace: [ 380.568915] dump_stack+0x244/0x39d [ 380.568945] ? dump_stack_print_info.cold.1+0x20/0x20 [ 380.568968] ? zap_class+0x640/0x640 [ 380.569006] should_fail.cold.4+0xa/0x17 [ 380.577820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 380.577840] ? find_held_lock+0x36/0x1c0 [ 380.577867] ? zap_class+0x640/0x640 [ 380.577883] ? lock_downgrade+0x900/0x900 [ 380.577908] ? find_held_lock+0x36/0x1c0 [ 380.577930] ? __lock_is_held+0xb5/0x140 [ 380.577964] ? perf_trace_sched_process_exec+0x860/0x860 [ 380.616359] __should_failslab+0x124/0x180 [ 380.620609] should_failslab+0x9/0x14 [ 380.624424] kmem_cache_alloc_trace+0x2d7/0x750 [ 380.629127] kernfs_fop_open+0xb0f/0xf80 [ 380.633198] ? fsnotify+0x4e5/0xf20 [ 380.636841] ? kernfs_fop_release+0x1a0/0x1a0 [ 380.641348] ? fsnotify_first_mark+0x350/0x350 [ 380.645935] ? __fsnotify_parent+0xcc/0x420 [ 380.650265] ? apparmor_capable+0x6c0/0x6c0 [ 380.654594] ? fsnotify+0xf20/0xf20 [ 380.658235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.663777] ? may_umount_tree+0x210/0x210 [ 380.668011] ? _copy_to_user+0x110/0x110 [ 380.672100] do_dentry_open+0x499/0x1250 [ 380.676171] ? kernfs_fop_release+0x1a0/0x1a0 [ 380.680672] ? chown_common+0x730/0x730 [ 380.684656] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 380.690201] ? security_inode_permission+0xd2/0x100 [ 380.695226] ? inode_permission+0xb2/0x560 [ 380.699465] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 380.704666] vfs_open+0xa0/0xd0 [ 380.707952] path_openat+0x12bc/0x5150 [ 380.711842] ? rcu_softirq_qs+0x20/0x20 [ 380.716080] ? unwind_dump+0x190/0x190 [ 380.719997] ? path_lookupat.isra.43+0xc00/0xc00 [ 380.724769] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 380.729787] ? expand_files.part.8+0x571/0x9a0 [ 380.734379] ? find_held_lock+0x36/0x1c0 [ 380.738456] ? __alloc_fd+0x347/0x6e0 [ 380.742263] ? lock_downgrade+0x900/0x900 [ 380.746421] ? getname+0x19/0x20 [ 380.749800] ? kasan_check_read+0x11/0x20 [ 380.753950] ? do_raw_spin_unlock+0xa7/0x330 [ 380.758363] ? do_raw_spin_trylock+0x270/0x270 [ 380.762944] ? __lock_is_held+0xb5/0x140 [ 380.767003] ? __check_object_size+0xb1/0x782 [ 380.771522] ? _raw_spin_unlock+0x2c/0x50 [ 380.775692] ? __alloc_fd+0x347/0x6e0 [ 380.779507] do_filp_open+0x255/0x380 [ 380.783314] ? may_open_dev+0x100/0x100 [ 380.787291] ? strncpy_from_user+0x411/0x5a0 [ 380.791718] ? digsig_verify+0x1530/0x1530 [ 380.795960] ? get_unused_fd_flags+0x122/0x1a0 [ 380.800567] ? getname_flags+0x26e/0x590 [ 380.804639] do_sys_open+0x568/0x700 [ 380.808360] ? filp_open+0x80/0x80 [ 380.811900] ? __ia32_sys_read+0xb0/0xb0 [ 380.815965] ? trace_hardirqs_off_caller+0x310/0x310 [ 380.821074] __x64_sys_openat+0x9d/0x100 [ 380.825141] do_syscall_64+0x1b9/0x820 [ 380.829036] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 380.834405] ? syscall_return_slowpath+0x5e0/0x5e0 [ 380.839337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.844182] ? trace_hardirqs_on_caller+0x310/0x310 [ 380.849204] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 380.854222] ? prepare_exit_to_usermode+0x291/0x3b0 [ 380.859247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.864107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.869305] RIP: 0033:0x457569 [ 380.872505] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.891423] RSP: 002b:00007f116c5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 380.899133] RAX: ffffffffffffffda RBX: 00007f116c5dec90 RCX: 0000000000457569 12:06:18 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b3e000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:18 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) 12:06:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x3, 0x4, 0x4, 0x234, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 12:06:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41}, 0x28) [ 380.906404] RDX: 0000000000000002 RSI: 0000000020000240 RDI: 0000000000000003 [ 380.913672] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 380.920940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f116c5df6d4 [ 380.928210] R13: 00000000004c2da7 R14: 00000000004d4758 R15: 0000000000000004 12:06:19 executing program 3 (fault-call:1 fault-nth:8): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) 12:06:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x26000) 12:06:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x8, 0x200000000000015c, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000040000000000000003000000f9f17000ffffffff08000000000000001a1f2cffaf6deb9c5cfaba31c347b066560d7e5ef90ed0087f30f12b5627733d8c99d108f4513d03f8bfda000afe1b460f8b35fb0c8926feb037018b12eb3449de942e58aeffbc97a70b7041f50d466a"], &(0x7f0000001740)='GPL\x00', 0x5, 0x2ed, &(0x7f0000001640)=""/226}, 0x48) socketpair(0x8, 0x800, 0xea8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000980)={r1, 0x0, 0x3a, 0xb0, &(0x7f0000000880)="f0e37e3add1bf218b2d7fb604225642e4d65a3b25402471ab83ffbc78625eaac5761ab4f3a02beb64e62b943e92964eda4b21e8aacc404fb16b8", &(0x7f00000008c0)=""/176, 0x8001}, 0x28) recvmsg$kcm(r0, &(0x7f0000000840)={&(0x7f0000000640)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000500)=[{&(0x7f00000006c0)=""/140, 0x8c}, {&(0x7f0000000780)=""/136, 0x88}], 0x2, &(0x7f0000000580)=""/2, 0x2, 0x7fff}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000040)=@nl=@kern={0x10, 0x0, 0x0, 0x8}, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)="ab54190be18d135ea715396c63440e890e0b6fc0bab7c9aa639f4909339747be2d94e70788de8debfaf12046cc9319cb3de40815f978d6b3f925d4a00c792d0c70a2723eb97de15b3841b0224b86e52b0a2a05d17086ba6e60c6ba8dfbf5d6e00565ae293be023b58f3853eaee556227e8eb0020bfc483ac073ae5eb7c8198c59a219bb40586c5b3e192e7ab9d", 0x8d}, {&(0x7f0000000180)="c908c250318fbf6893267dabfc560838b2bb4cee03431a", 0x17}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="4ba3bea2645a98490b5c3c0b5e12398c16865af053d2591e3ded47ac770b6d61fd0d9c191d2e5d55b3611af1b128d80a99314d5ffd3f506b0123bcae63489f7f974fd79c0e1561fbd318bbcbb8c1372378ee2c579dc4945c81d6c88ce94ab8d8022459637a7732bbb55b3d42a269fb6129df698e8b20906ff13bf4501237096e2318746a577681446c68f44dd7d284252a6f50351259b68f01a6fff494f3c2a56afa630c517374522da7babb15f117650259ecb2a6", 0xb5}, {&(0x7f00000002c0)="2aef57faee4d0298d9c31050f3078004ec18e8b1f5b44cd0006f788ebdbe241281d5d30e6ca7151bac42e42e2699dd14dac97c7debceb336744f9ce3c483b6ed461dd8de3626024a924e433628e585529189e268c4412c51a081c918595837b03add5b07f2971683163d60cd46abe6b9dbbcc562ce25f3f3175da8d0a01c81bf67367017", 0x84}, {&(0x7f0000000380)="f58632a5985dce242f083584d629e0386564b1153885e30795b12870cbf835988018aef56aad1bc82eb008dfce70ed2e36bec54dbc7cc12ce712319a793c0931dac170991467479ae37a3b68e1a96a380bbca48d5f035e6532ce1e845b155f1474f431e5255da5053f9d249ac196bf5e07dff8a6b8265d5402668b4fd0f581545b748c67f7216709254dd552f644f7809adf97f0a437fb8f5f91d712dad23c80dfeaccac5c97d3b89de935cff9e20db38f48b8b287a165525af53601be2d0d193a1b9f59c7e996f43ca8b5", 0xcb}], 0x6, &(0x7f0000000500), 0x0, 0x4000000}, 0x885) 12:06:19 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0a000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:19 executing program 2 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 381.368095] FAULT_INJECTION: forcing a failure. [ 381.368095] name failslab, interval 1, probability 0, space 0, times 0 [ 381.382923] CPU: 0 PID: 22989 Comm: syz-executor3 Not tainted 4.20.0-rc1+ #81 [ 381.390225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.399585] Call Trace: [ 381.402198] dump_stack+0x244/0x39d [ 381.405849] ? dump_stack_print_info.cold.1+0x20/0x20 [ 381.411058] ? zap_class+0x640/0x640 [ 381.414789] should_fail.cold.4+0xa/0x17 [ 381.418859] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 381.423968] ? find_held_lock+0x36/0x1c0 [ 381.428053] ? zap_class+0x640/0x640 [ 381.431774] ? lock_downgrade+0x900/0x900 [ 381.435932] ? find_held_lock+0x36/0x1c0 [ 381.440001] ? __lock_is_held+0xb5/0x140 [ 381.444090] ? perf_trace_sched_process_exec+0x860/0x860 [ 381.449561] __should_failslab+0x124/0x180 [ 381.453805] should_failslab+0x9/0x14 [ 381.457612] kmem_cache_alloc_trace+0x2d7/0x750 [ 381.462306] kernfs_fop_open+0xb0f/0xf80 [ 381.466366] ? fsnotify+0x4e5/0xf20 [ 381.470001] ? kernfs_fop_release+0x1a0/0x1a0 [ 381.474507] ? fsnotify_first_mark+0x350/0x350 [ 381.479093] ? __fsnotify_parent+0xcc/0x420 [ 381.483418] ? apparmor_capable+0x6c0/0x6c0 [ 381.487741] ? fsnotify+0xf20/0xf20 [ 381.491379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.496922] ? may_umount_tree+0x210/0x210 [ 381.501161] ? _copy_to_user+0x110/0x110 [ 381.505236] do_dentry_open+0x499/0x1250 [ 381.509306] ? kernfs_fop_release+0x1a0/0x1a0 [ 381.513808] ? chown_common+0x730/0x730 [ 381.517784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.523335] ? security_inode_permission+0xd2/0x100 [ 381.528364] ? inode_permission+0xb2/0x560 [ 381.532600] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 381.537796] vfs_open+0xa0/0xd0 [ 381.541082] path_openat+0x12bc/0x5150 [ 381.544999] ? rcu_softirq_qs+0x20/0x20 [ 381.548981] ? unwind_dump+0x190/0x190 [ 381.552909] ? path_lookupat.isra.43+0xc00/0xc00 [ 381.557670] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 381.562686] ? expand_files.part.8+0x571/0x9a0 [ 381.567280] ? find_held_lock+0x36/0x1c0 [ 381.571358] ? __alloc_fd+0x347/0x6e0 [ 381.575164] ? lock_downgrade+0x900/0x900 [ 381.579320] ? getname+0x19/0x20 [ 381.582928] ? kasan_check_read+0x11/0x20 [ 381.587081] ? do_raw_spin_unlock+0xa7/0x330 [ 381.591503] ? do_raw_spin_trylock+0x270/0x270 [ 381.596093] ? __lock_is_held+0xb5/0x140 [ 381.600159] ? __check_object_size+0xb1/0x782 [ 381.604670] ? _raw_spin_unlock+0x2c/0x50 [ 381.608825] ? __alloc_fd+0x347/0x6e0 [ 381.612644] do_filp_open+0x255/0x380 [ 381.616446] ? may_open_dev+0x100/0x100 [ 381.620428] ? strncpy_from_user+0x411/0x5a0 [ 381.624854] ? digsig_verify+0x1530/0x1530 [ 381.629097] ? get_unused_fd_flags+0x122/0x1a0 [ 381.633689] ? getname_flags+0x26e/0x590 [ 381.637764] do_sys_open+0x568/0x700 [ 381.641483] ? filp_open+0x80/0x80 [ 381.645032] ? __ia32_sys_read+0xb0/0xb0 [ 381.649105] ? trace_hardirqs_off_caller+0x310/0x310 [ 381.654222] __x64_sys_openat+0x9d/0x100 [ 381.658301] do_syscall_64+0x1b9/0x820 [ 381.662194] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 381.667563] ? syscall_return_slowpath+0x5e0/0x5e0 [ 381.672493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.677340] ? trace_hardirqs_on_caller+0x310/0x310 [ 381.682359] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 381.687381] ? prepare_exit_to_usermode+0x291/0x3b0 [ 381.692407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.697263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.702456] RIP: 0033:0x457569 [ 381.705658] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 381.724561] RSP: 002b:00007f116c5dec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 381.732269] RAX: ffffffffffffffda RBX: 00007f116c5dec90 RCX: 0000000000457569 [ 381.739538] RDX: 0000000000000002 RSI: 0000000020000240 RDI: 0000000000000003 [ 381.746807] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 381.754072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f116c5df6d4 [ 381.761340] R13: 00000000004c2da7 R14: 00000000004d4758 R15: 0000000000000004 12:06:19 executing program 3 (fault-call:1 fault-nth:9): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 381.791325] FAULT_INJECTION: forcing a failure. [ 381.791325] name failslab, interval 1, probability 0, space 0, times 0 [ 381.824282] CPU: 1 PID: 22995 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 381.831585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:06:19 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)="2f02726f75702e7374617000084a96ecf6b5d29a375ccdf07428cbf63e5692e37261380d8afcef581b778cd642c71b9774a864a538ba9180e05ad48625c9be517e3cc533103aaeddb4737f8be9ea651f08e4ee0142", 0x2761, 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0xfffffd55) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0x20) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xfffffffffffffffd, 0x0) ioctl$TUNSETLINK(r2, 0x400454cd, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000480)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f00000002c0), 0x0, &(0x7f00000018c0)=[{0x10, 0x107}], 0x10, 0x800}, 0x20008000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xfffffffffffffff9, 0x9, 0x0, 0x9, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7fff, 0x8, 0x3ff, 0xff, 0x284, 0x826d, 0x7c, 0x10001, 0x6640, 0x5, 0x5, 0x1, 0x8000, 0x5, 0x57ce, 0x4f78, 0x0, 0x0, 0xdca, 0x6, 0xeb7b, 0x0, 0xfffffffffffffffe, 0x10001, 0x0, 0x9, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x6}, 0x202, 0x7, 0x9a, 0x8, 0xef, 0x5, 0x7ff}, 0x0, 0x9, r1, 0x8) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r0, 0x10, &(0x7f0000000280)={&(0x7f0000000640)=""/235, 0xeb, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r3, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000002c0)='memory.events\x00', 0x0, 0x0) socketpair(0x8, 0x7, 0x0, &(0x7f0000000340)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0x18}, 0xfffffffffffffe8b) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040)}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000700000000000000ff0100000000000001"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc020660b, 0x20000001) [ 381.840945] Call Trace: [ 381.843554] dump_stack+0x244/0x39d [ 381.847209] ? dump_stack_print_info.cold.1+0x20/0x20 [ 381.852434] ? __lock_acquire+0x62f/0x4c20 [ 381.856701] should_fail.cold.4+0xa/0x17 [ 381.860781] ? find_held_lock+0x36/0x1c0 [ 381.864863] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 381.869989] ? lock_downgrade+0x900/0x900 [ 381.874165] ? check_preemption_disabled+0x48/0x280 [ 381.879201] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 381.884148] ? kasan_check_read+0x11/0x20 12:06:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 381.888311] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 381.893601] ? rcu_softirq_qs+0x20/0x20 [ 381.897596] ? find_held_lock+0x36/0x1c0 [ 381.901700] ? perf_trace_sched_process_exec+0x860/0x860 [ 381.907175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.912739] __should_failslab+0x124/0x180 [ 381.916992] should_failslab+0x9/0x14 [ 381.920818] __kmalloc+0x2e0/0x760 [ 381.924377] ? bpf_test_init.isra.10+0x98/0x100 [ 381.929079] bpf_test_init.isra.10+0x98/0x100 [ 381.933625] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 381.938487] bpf_prog_test_run_skb+0x109/0xcb0 [ 381.943083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 381.948654] ? cap_capable+0x1f9/0x260 [ 381.952558] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 381.957402] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 381.962944] ? fput+0x130/0x1a0 [ 381.966227] ? __bpf_prog_get+0x9b/0x290 [ 381.970297] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 381.975146] bpf_prog_test_run+0x130/0x1a0 [ 381.979394] __x64_sys_bpf+0x3d8/0x520 [ 381.983290] ? bpf_prog_get+0x20/0x20 [ 381.987118] do_syscall_64+0x1b9/0x820 [ 381.991013] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 381.996394] ? syscall_return_slowpath+0x5e0/0x5e0 [ 382.001324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.006174] ? trace_hardirqs_on_caller+0x310/0x310 [ 382.011193] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 382.016212] ? prepare_exit_to_usermode+0x291/0x3b0 [ 382.021240] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.026093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.031284] RIP: 0033:0x457569 [ 382.034487] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.053393] RSP: 002b:00007f7246afdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 382.061105] RAX: ffffffffffffffda RBX: 00007f7246afdc90 RCX: 0000000000457569 [ 382.068376] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 382.075644] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 382.082916] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7246afe6d4 12:06:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b008001a0000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 382.090359] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000006 12:06:20 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0x11, 0x1000000000000003, 0x0) recvmsg(r0, &(0x7f0000000f00)={&(0x7f0000000940)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000e00)=[{&(0x7f00000009c0)=""/56, 0x38}, {&(0x7f0000000a00)=""/247, 0xf7}, {&(0x7f0000000b00)=""/46, 0x2e}, {&(0x7f0000000b40)=""/188, 0xbc}, {&(0x7f0000000c00)=""/199, 0xc7}, {&(0x7f0000000d00)=""/249, 0xf9}], 0x6, &(0x7f0000000e80)=""/117, 0x75, 0x5}, 0x2) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000040)=@llc={0x1a, 0x30f, 0x800, 0x7f, 0x4, 0x46f, @dev={[], 0x16}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000f40)=ANY=[], 0x0, 0x24000800}, 0x4000000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r1}) 12:06:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) r2 = getpid() ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000140)=0x1) r3 = perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x200, 0x4, 0x8, 0x6, 0x0, 0x3, 0x10000, 0x1, 0x4, 0x0, 0x6, 0xad, 0x7fffffff, 0x800, 0xffffffffffffff01, 0x3f, 0x6, 0x1ff, 0x7, 0x7, 0x7f, 0x76f, 0x439, 0x7, 0x32, 0x2, 0x200, 0x7, 0x0, 0x69, 0xcfd8, 0x8001, 0x400, 0x7, 0x8000, 0x2, 0x0, 0xfe1, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0xa090, 0x2, 0x1ff, 0x7, 0x0, 0x9}, r2, 0xe, r0, 0x1) gettid() perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x70, 0x80, 0x80, 0x9, 0x9, 0x0, 0x1, 0x8000, 0x0, 0x636, 0x8, 0x391, 0x6, 0x3, 0x12f175a, 0x100000000, 0x144, 0x8, 0x5, 0x3, 0xfffffffffffffff8, 0xfffffffffffff1af, 0x7, 0x8, 0x6d6e, 0x28, 0x1f, 0x8, 0x8, 0x9, 0x7, 0x2, 0x10001, 0x101, 0x8, 0x6fc, 0x5, 0x0, 0x6, 0x7, @perf_bp={&(0x7f0000000040), 0x2}, 0x10200, 0x8, 0x3f, 0x7, 0x1f, 0xff, 0x80000000}, r0, 0xd, r3, 0x5) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0xffffffffffffffff) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000a000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:20 executing program 2 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:20 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='/group.subtree_control\x00', 0x2, 0x0) 12:06:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000001000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:20 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_/ontrol\x00', 0x2, 0x0) [ 382.396793] FAULT_INJECTION: forcing a failure. [ 382.396793] name failslab, interval 1, probability 0, space 0, times 0 [ 382.420299] CPU: 1 PID: 23042 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 382.427620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.436981] Call Trace: [ 382.439603] dump_stack+0x244/0x39d [ 382.443262] ? dump_stack_print_info.cold.1+0x20/0x20 [ 382.448480] should_fail.cold.4+0xa/0x17 [ 382.452557] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 382.457670] ? save_stack+0x43/0xd0 [ 382.461302] ? kasan_kmalloc+0xc7/0xe0 [ 382.465190] ? __kmalloc+0x15b/0x760 [ 382.468911] ? bpf_test_init.isra.10+0x98/0x100 [ 382.473589] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 382.478867] ? rcu_softirq_qs+0x20/0x20 [ 382.482847] ? find_held_lock+0x36/0x1c0 [ 382.486921] ? find_held_lock+0x36/0x1c0 [ 382.491011] ? perf_trace_sched_process_exec+0x860/0x860 [ 382.496485] __should_failslab+0x124/0x180 [ 382.500728] should_failslab+0x9/0x14 [ 382.504556] kmem_cache_alloc_trace+0x2d7/0x750 [ 382.509234] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 382.514778] ? bpf_test_init.isra.10+0x70/0x100 [ 382.519463] bpf_prog_test_run_skb+0x1da/0xcb0 [ 382.524058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 382.529603] ? cap_capable+0x1f9/0x260 [ 382.533504] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 382.538349] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 382.543893] ? fput+0x130/0x1a0 [ 382.547176] ? __bpf_prog_get+0x9b/0x290 [ 382.551247] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 382.556092] bpf_prog_test_run+0x130/0x1a0 [ 382.560333] __x64_sys_bpf+0x3d8/0x520 [ 382.564222] ? bpf_prog_get+0x20/0x20 [ 382.568056] do_syscall_64+0x1b9/0x820 [ 382.571949] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 382.577327] ? syscall_return_slowpath+0x5e0/0x5e0 [ 382.582263] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.587108] ? trace_hardirqs_on_caller+0x310/0x310 [ 382.592131] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 382.597151] ? prepare_exit_to_usermode+0x291/0x3b0 [ 382.602179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.607042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.612235] RIP: 0033:0x457569 [ 382.615439] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 382.634337] RSP: 002b:00007f7246afdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 382.642050] RAX: ffffffffffffffda RBX: 00007f7246afdc90 RCX: 0000000000457569 [ 382.649322] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 382.656592] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 382.664121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7246afe6d4 [ 382.671391] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000006 12:06:20 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000040000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:20 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)="6367726f75702e737562747265655f636f6e74726f6c02", 0x2, 0x0) 12:06:21 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x2, 0x18}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000001200)=ANY=[@ANYBLOB='-3'], 0x2) 12:06:21 executing program 2 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:21 executing program 1: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a000094e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88b75e05b18a4cb3a9cd12dcefdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x800003) openat$cgroup(r1, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r0, 0x6, 0x1, 0x4, &(0x7f0000000140)=[0x0, 0x0], 0x2}, 0x20) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000240)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$inet6(0xa, 0x80000, 0x3, &(0x7f0000000280)) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'syzkaller1\x00', 0x400}) [ 383.066448] FAULT_INJECTION: forcing a failure. [ 383.066448] name failslab, interval 1, probability 0, space 0, times 0 [ 383.080899] CPU: 1 PID: 23065 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 383.088198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.097570] Call Trace: [ 383.100189] dump_stack+0x244/0x39d [ 383.103844] ? dump_stack_print_info.cold.1+0x20/0x20 [ 383.109066] ? kasan_check_read+0x11/0x20 [ 383.113233] ? __debug_object_init+0x57d/0x1290 [ 383.113254] ? trace_hardirqs_off_caller+0x310/0x310 [ 383.113278] should_fail.cold.4+0xa/0x17 [ 383.123067] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 383.123091] ? __debug_object_init+0x57d/0x1290 [ 383.136910] ? rcu_softirq_qs+0x20/0x20 [ 383.140894] ? unwind_dump+0x190/0x190 [ 383.144809] ? debug_object_free+0x690/0x690 [ 383.149229] ? is_bpf_text_address+0xd3/0x170 [ 383.153729] ? kernel_text_address+0x79/0xf0 [ 383.158146] ? __kernel_text_address+0xd/0x40 [ 383.162652] ? unwind_get_return_address+0x61/0xa0 [ 383.167596] ? __save_stack_trace+0x8d/0xf0 [ 383.171937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.177504] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 383.183072] ? rcu_pm_notify+0xc0/0xc0 [ 383.186982] __should_failslab+0x124/0x180 [ 383.191232] should_failslab+0x9/0x14 [ 383.195044] kmem_cache_alloc+0x47/0x730 [ 383.199114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.204657] ? __phys_addr+0xa6/0x120 [ 383.208461] ? kasan_unpoison_shadow+0x35/0x50 [ 383.213064] __build_skb+0xab/0x430 [ 383.216738] ? skb_try_coalesce+0x1b70/0x1b70 [ 383.221245] ? kasan_check_write+0x14/0x20 [ 383.225482] ? sock_init_data+0x9b1/0xdc0 [ 383.229637] ? rcu_pm_notify+0xc0/0xc0 [ 383.233531] ? sk_stop_timer+0x50/0x50 [ 383.237429] build_skb+0x77/0x270 [ 383.240890] ? rcu_read_lock_sched_held+0x14f/0x180 [ 383.245909] ? __build_skb+0x430/0x430 [ 383.249815] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.255360] ? bpf_test_init.isra.10+0x70/0x100 [ 383.260058] bpf_prog_test_run_skb+0x289/0xcb0 [ 383.264645] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.270186] ? cap_capable+0x1f9/0x260 [ 383.274117] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 383.278962] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 383.284503] ? fput+0x130/0x1a0 [ 383.287790] ? __bpf_prog_get+0x9b/0x290 [ 383.291866] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 383.296712] bpf_prog_test_run+0x130/0x1a0 [ 383.300957] __x64_sys_bpf+0x3d8/0x520 [ 383.304851] ? bpf_prog_get+0x20/0x20 [ 383.308681] do_syscall_64+0x1b9/0x820 [ 383.312571] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 383.317937] ? syscall_return_slowpath+0x5e0/0x5e0 [ 383.322868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.327715] ? trace_hardirqs_on_caller+0x310/0x310 [ 383.332733] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 383.337757] ? prepare_exit_to_usermode+0x291/0x3b0 [ 383.342792] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.347653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.352844] RIP: 0033:0x457569 [ 383.356051] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 383.374960] RSP: 002b:00007f7246afdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 383.382676] RAX: ffffffffffffffda RBX: 00007f7246afdc90 RCX: 0000000000457569 [ 383.389945] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 383.397218] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 383.404490] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7246afe6d4 [ 383.411764] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000006 12:06:21 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000007780)={0x0, 0x70, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x0, 0xb, 0x0, 0x0, 0x0, 0x7f, 0x1f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000002c0)="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", &(0x7f00000000c0)=""/20}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000004900)={&(0x7f00000048c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8df, 0x80000001, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000001680)='tasks\x00', 0x2, 0x0) r3 = getpid() perf_event_open(&(0x7f0000001500)={0x2, 0x70, 0x0, 0xff, 0xf3a, 0x81, 0x0, 0x1ff, 0x84, 0x0, 0x7, 0x1, 0x7, 0xd3, 0x5, 0x9, 0xe8c, 0x7, 0x401, 0x1000, 0x9, 0x4, 0x1, 0x21718528, 0x0, 0x0, 0x7f, 0x6, 0x5d, 0x0, 0x12e, 0x7ff, 0x961f, 0x5, 0xa069, 0x5, 0x100, 0xa2, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x2}, 0x1018, 0x8, 0x0, 0x7, 0x2, 0x2}, r3, 0xf, r0, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001440)={r1, &(0x7f0000001300), &(0x7f00000013c0)=""/109}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000001600)=0x7) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b02e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f00", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000001480)={0x4, 0x70, 0x1, 0x3f, 0x73a, 0x1000, 0x0, 0x8a, 0x40100, 0xa, 0x7fff, 0x7, 0x100, 0x7f, 0x0, 0x0, 0x8, 0x0, 0x4, 0x1, 0x9, 0x5, 0xafa6, 0x100000000, 0x5, 0xfffffffffffffffe, 0x79a3, 0x8001, 0xfffffffffffffbff, 0xaaf, 0x0, 0x4, 0x0, 0x3, 0x100000000, 0xfffffffffffffffd, 0x2fdb, 0xb8, 0x0, 0x8000000, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x10000, 0x639, 0x0, 0x0, 0x800, 0x7, 0xfffffffffffffffd}) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000001380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000012c0)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f00000023c0)}], 0x1, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r7, &(0x7f0000001580)='cpu.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0x8000b, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:06:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00f00000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:21 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="500000000000000084000000000000009fd566b2d76add0ab61dfdaa818d00b47cbf9aafbf1804958776667d6c35476510d20c46dd42970052e42e760000000000000000caa4efd4f1823ab2965137c824cf00105822483fb305a680eb0e194be23b49c0cb56dc35605f64bc8d00deddaac0234bac92163065eb6150191e0b5281e798049fe6a9faff74671f7c68f47ff6f3646c363c92abd6fa423fc5e8e59138cb4a50e869fc9d88eefa2bda76cea002"], 0x50}, 0x0) 12:06:21 executing program 2 (fault-call:3 fault-nth:3): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x1ff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x2, 0x70, 0x2, 0x72, 0xff, 0x8001, 0x0, 0x2, 0x4000, 0x2, 0x800, 0x1000, 0x401, 0x435e46f1, 0x5, 0x81, 0x1, 0x272, 0x100000000, 0x3ff, 0x1, 0x81, 0x7, 0x100000000, 0x4a, 0x100000001, 0xfffffffffffff801, 0x7, 0x7, 0x8, 0x4, 0x401, 0x4, 0x8c, 0x5, 0x7ff, 0x100000001, 0x3, 0x0, 0xffffffff, 0x3, @perf_config_ext={0x5, 0x2}, 0x40, 0x7, 0xfe9, 0x6, 0x3ff, 0x4}) [ 383.638195] FAULT_INJECTION: forcing a failure. [ 383.638195] name failslab, interval 1, probability 0, space 0, times 0 [ 383.649697] CPU: 1 PID: 23092 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 383.656992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.666364] Call Trace: [ 383.668977] dump_stack+0x244/0x39d [ 383.672625] ? dump_stack_print_info.cold.1+0x20/0x20 [ 383.677844] should_fail.cold.4+0xa/0x17 [ 383.681933] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 383.687064] ? find_held_lock+0x36/0x1c0 [ 383.691143] ? print_usage_bug+0xc0/0xc0 [ 383.695216] ? is_bpf_text_address+0xac/0x170 [ 383.699718] ? lock_downgrade+0x900/0x900 [ 383.703869] ? check_preemption_disabled+0x48/0x280 [ 383.708907] ? mark_held_locks+0x130/0x130 [ 383.713656] ? __lock_acquire+0x62f/0x4c20 [ 383.717905] ? is_bpf_text_address+0xd3/0x170 [ 383.722418] ? kernel_text_address+0x79/0xf0 [ 383.726846] __should_failslab+0x124/0x180 [ 383.731095] should_failslab+0x9/0x14 [ 383.734901] kmem_cache_alloc+0x47/0x730 [ 383.738980] skb_clone+0x1bb/0x500 [ 383.742527] ? skb_split+0x11e0/0x11e0 [ 383.746418] ? kmem_cache_alloc+0x12e/0x730 [ 383.750746] ? build_skb+0x77/0x270 [ 383.754383] ? bpf_prog_test_run_skb+0x289/0xcb0 [ 383.759141] ? bpf_prog_test_run+0x130/0x1a0 [ 383.763553] ? __x64_sys_bpf+0x3d8/0x520 [ 383.767620] ? do_syscall_64+0x1b9/0x820 [ 383.771684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.777065] ? kernel_text_address+0x79/0xf0 [ 383.781480] ? __kernel_text_address+0xd/0x40 [ 383.785981] bpf_clone_redirect+0xb9/0x490 [ 383.790229] bpf_prog_e2ed69a7d397132f+0x70e/0x1000 [ 383.795249] ? bpf_test_run+0x175/0x780 [ 383.799231] ? lock_downgrade+0x900/0x900 [ 383.803383] ? ktime_get+0x332/0x400 [ 383.807113] ? pvclock_read_flags+0x160/0x160 [ 383.811610] ? bpf_test_run+0x175/0x780 [ 383.815594] ? trace_hardirqs_off_caller+0x310/0x310 [ 383.820712] ? lock_acquire+0x1ed/0x520 [ 383.824717] ? bpf_test_run+0x3cb/0x780 [ 383.828701] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 383.834243] ? check_preemption_disabled+0x48/0x280 [ 383.839273] ? kasan_check_read+0x11/0x20 [ 383.843426] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 383.848715] ? rcu_softirq_qs+0x20/0x20 [ 383.852692] ? bpf_cgroup_storage_release+0x220/0x220 [ 383.857978] ? skb_try_coalesce+0x1b70/0x1b70 [ 383.862487] ? bpf_test_run+0x25d/0x780 [ 383.866476] ? netlink_diag_dump+0x2a0/0x2a0 [ 383.870944] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 383.876483] ? bpf_test_init.isra.10+0x70/0x100 [ 383.881160] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 383.885931] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 383.890776] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 383.896323] ? fput+0x130/0x1a0 [ 383.899610] ? __bpf_prog_get+0x9b/0x290 [ 383.903694] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 383.908542] ? bpf_prog_test_run+0x130/0x1a0 [ 383.912964] ? __x64_sys_bpf+0x3d8/0x520 [ 383.917041] ? bpf_prog_get+0x20/0x20 [ 383.920871] ? do_syscall_64+0x1b9/0x820 [ 383.924939] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 383.930315] ? syscall_return_slowpath+0x5e0/0x5e0 12:06:21 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:21 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000a0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 383.935256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.940111] ? trace_hardirqs_on_caller+0x310/0x310 [ 383.945148] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 383.950179] ? prepare_exit_to_usermode+0x291/0x3b0 [ 383.955217] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.960077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:22 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r0}) close(r0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x7fffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r1, 0x8, 0x2}, 0x10) 12:06:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b003f0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:22 executing program 5: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000080)="ac", 0x1}], 0x1}, 0x0) socketpair(0x0, 0x8080e, 0x80, &(0x7f00000000c0)) 12:06:22 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:22 executing program 2 (fault-call:3 fault-nth:4): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:22 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00600000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r0, 0x0, 0x5e, &(0x7f0000000200)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c00", r2}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) 12:06:22 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000007780)={0x0, 0x70, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x0, 0xb, 0x0, 0x0, 0x0, 0x7f, 0x1f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000002c0)="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", &(0x7f00000000c0)=""/20}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000004900)={&(0x7f00000048c0)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x8df, 0x80000001, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000001680)='tasks\x00', 0x2, 0x0) r3 = getpid() perf_event_open(&(0x7f0000001500)={0x2, 0x70, 0x0, 0xff, 0xf3a, 0x81, 0x0, 0x1ff, 0x84, 0x0, 0x7, 0x1, 0x7, 0xd3, 0x5, 0x9, 0xe8c, 0x7, 0x401, 0x1000, 0x9, 0x4, 0x1, 0x21718528, 0x0, 0x0, 0x7f, 0x6, 0x5d, 0x0, 0x12e, 0x7ff, 0x961f, 0x5, 0xa069, 0x5, 0x100, 0xa2, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x2}, 0x1018, 0x8, 0x0, 0x7, 0x2, 0x2}, r3, 0xf, r0, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001440)={r1, &(0x7f0000001300), &(0x7f00000013c0)=""/109}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/net/tun\x00', 0x101000, 0x0) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000001600)=0x7) r5 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b02e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f00", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000001480)={0x4, 0x70, 0x1, 0x3f, 0x73a, 0x1000, 0x0, 0x8a, 0x40100, 0xa, 0x7fff, 0x7, 0x100, 0x7f, 0x0, 0x0, 0x8, 0x0, 0x4, 0x1, 0x9, 0x5, 0xafa6, 0x100000000, 0x5, 0xfffffffffffffffe, 0x79a3, 0x8001, 0xfffffffffffffbff, 0xaaf, 0x0, 0x4, 0x0, 0x3, 0x100000000, 0xfffffffffffffffd, 0x2fdb, 0xb8, 0x0, 0x8000000, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x10000, 0x639, 0x0, 0x0, 0x800, 0x7, 0xfffffffffffffffd}) ioctl$PERF_EVENT_IOC_ID(r6, 0x80082407, &(0x7f0000001380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000012c0)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f00000023c0)}], 0x1, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000000)) openat$cgroup_ro(r7, &(0x7f0000001580)='cpu.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0x8000b, 0x0) ioctl$PERF_EVENT_IOC_RESET(r7, 0x2403, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 384.838222] FAULT_INJECTION: forcing a failure. [ 384.838222] name failslab, interval 1, probability 0, space 0, times 0 [ 384.849599] CPU: 0 PID: 23135 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 384.856884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.866250] Call Trace: [ 384.868862] dump_stack+0x244/0x39d [ 384.872507] ? dump_stack_print_info.cold.1+0x20/0x20 [ 384.877734] ? zap_class+0x640/0x640 [ 384.881462] should_fail.cold.4+0xa/0x17 [ 384.885536] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 384.890646] ? zap_class+0x640/0x640 [ 384.894366] ? find_held_lock+0x36/0x1c0 [ 384.898448] ? is_bpf_text_address+0xac/0x170 [ 384.902959] ? find_held_lock+0x36/0x1c0 [ 384.907051] ? depot_save_stack+0x292/0x470 [ 384.911381] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 384.916490] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 384.921605] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 384.926197] ? trace_hardirqs_on+0xbd/0x310 [ 384.930524] ? kasan_check_read+0x11/0x20 [ 384.934679] ? trace_hardirqs_off_caller+0x310/0x310 [ 384.939792] ? unwind_get_return_address+0x61/0xa0 [ 384.944744] __should_failslab+0x124/0x180 [ 384.948992] should_failslab+0x9/0x14 [ 384.952805] kmem_cache_alloc_node_trace+0x5a/0x740 [ 384.957830] ? save_stack+0xa9/0xd0 [ 384.961465] ? save_stack+0x43/0xd0 [ 384.965108] __kmalloc_node_track_caller+0x3c/0x70 [ 384.970054] __kmalloc_reserve.isra.40+0x41/0xe0 [ 384.974822] pskb_expand_head+0x230/0x10f0 [ 384.979077] ? memcpy+0x45/0x50 [ 384.982362] ? __copy_skb_header+0x350/0x6b0 [ 384.986774] ? skb_release_data+0x880/0x880 [ 384.991103] ? __alloc_skb+0x770/0x770 [ 384.995004] ? __lock_is_held+0xb5/0x140 [ 384.999085] ? kasan_check_write+0x14/0x20 [ 385.003327] ? __skb_clone+0x6c7/0xa00 [ 385.007222] ? __copy_skb_header+0x6b0/0x6b0 [ 385.011641] ? kmem_cache_alloc+0x33a/0x730 [ 385.015974] skb_ensure_writable+0x3dd/0x640 [ 385.020392] ? skb_checksum_setup+0xaa0/0xaa0 [ 385.024887] ? kmem_cache_alloc+0x12e/0x730 [ 385.029210] ? build_skb+0x77/0x270 [ 385.032838] ? bpf_prog_test_run_skb+0x289/0xcb0 [ 385.037598] ? bpf_prog_test_run+0x130/0x1a0 [ 385.042005] ? __x64_sys_bpf+0x3d8/0x520 [ 385.046073] ? do_syscall_64+0x1b9/0x820 [ 385.050137] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.055510] ? kernel_text_address+0x79/0xf0 [ 385.059928] ? __kernel_text_address+0xd/0x40 [ 385.064433] bpf_clone_redirect+0x14a/0x490 [ 385.068769] bpf_prog_e2ed69a7d397132f+0xd33/0x1000 [ 385.073792] ? bpf_test_run+0x175/0x780 [ 385.077771] ? lock_downgrade+0x900/0x900 [ 385.081919] ? ktime_get+0x332/0x400 [ 385.085648] ? pvclock_read_flags+0x160/0x160 [ 385.090151] ? bpf_test_run+0x175/0x780 [ 385.094131] ? trace_hardirqs_off_caller+0x310/0x310 [ 385.099247] ? lock_acquire+0x1ed/0x520 [ 385.103223] ? bpf_test_run+0x3cb/0x780 [ 385.107205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.112746] ? check_preemption_disabled+0x48/0x280 [ 385.117772] ? kasan_check_read+0x11/0x20 [ 385.121922] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 385.127198] ? rcu_softirq_qs+0x20/0x20 [ 385.131173] ? bpf_cgroup_storage_release+0x220/0x220 [ 385.136372] ? skb_try_coalesce+0x1b70/0x1b70 [ 385.140883] ? bpf_test_run+0x25d/0x780 [ 385.144879] ? netlink_diag_dump+0x2a0/0x2a0 [ 385.149306] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 385.154849] ? bpf_test_init.isra.10+0x70/0x100 [ 385.159533] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 385.164312] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 385.169163] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 385.174727] ? fput+0x130/0x1a0 [ 385.178015] ? __bpf_prog_get+0x9b/0x290 [ 385.182094] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 385.186939] ? bpf_prog_test_run+0x130/0x1a0 [ 385.191358] ? __x64_sys_bpf+0x3d8/0x520 [ 385.195428] ? bpf_prog_get+0x20/0x20 [ 385.199252] ? do_syscall_64+0x1b9/0x820 [ 385.203319] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 385.208690] ? syscall_return_slowpath+0x5e0/0x5e0 [ 385.213623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.218472] ? trace_hardirqs_on_caller+0x310/0x310 [ 385.223497] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 385.228520] ? prepare_exit_to_usermode+0x291/0x3b0 [ 385.233549] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:06:23 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 385.238407] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:23 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00050000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:23 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)="6367726f75702e737562747265655f636f6e74726f6c03", 0x2, 0x0) 12:06:23 executing program 2 (fault-call:3 fault-nth:5): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:23 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x81, 0x2, 0x1, 0x0, 0x0, 0x6, 0x40040, 0x2, 0x101, 0xb109, 0xff, 0x3ff, 0x4, 0x10000, 0x7fff, 0xfa21, 0x80000001, 0x5, 0x4, 0x3, 0x8, 0xfffffffffffffff9, 0x3ff, 0x9, 0x557d, 0x9c, 0x84, 0xf4f, 0x2, 0x7f, 0x76f1b8a3, 0x7, 0x1d1, 0x7f, 0x2, 0x5, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0xf}, 0xa010, 0x7, 0x2, 0x7, 0x1b, 0x82b, 0x5}, r1, 0xd, r0, 0x4) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) [ 385.466820] FAULT_INJECTION: forcing a failure. [ 385.466820] name failslab, interval 1, probability 0, space 0, times 0 [ 385.478176] CPU: 1 PID: 23162 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 385.485472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.494831] Call Trace: [ 385.497439] dump_stack+0x244/0x39d [ 385.501088] ? dump_stack_print_info.cold.1+0x20/0x20 [ 385.506312] ? rb_erase+0x3710/0x3710 [ 385.510132] should_fail.cold.4+0xa/0x17 [ 385.514208] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 385.519323] ? cpuacct_charge+0x265/0x440 [ 385.523501] ? find_held_lock+0x36/0x1c0 [ 385.527591] ? zap_class+0x640/0x640 [ 385.531312] ? print_usage_bug+0xc0/0xc0 [ 385.535381] ? lock_downgrade+0x900/0x900 [ 385.539541] ? check_preemption_disabled+0x48/0x280 [ 385.544571] ? print_usage_bug+0xc0/0xc0 [ 385.548640] ? __lock_is_held+0xb5/0x140 [ 385.552715] ? print_usage_bug+0xc0/0xc0 [ 385.556780] ? print_usage_bug+0xc0/0xc0 [ 385.560858] __should_failslab+0x124/0x180 [ 385.565107] should_failslab+0x9/0x14 [ 385.568921] kmem_cache_alloc_node_trace+0x5a/0x740 [ 385.573941] ? print_usage_bug+0xc0/0xc0 [ 385.578006] ? __lock_acquire+0x62f/0x4c20 [ 385.582444] __kmalloc_node_track_caller+0x3c/0x70 [ 385.587389] __kmalloc_reserve.isra.40+0x41/0xe0 [ 385.592162] pskb_expand_head+0x230/0x10f0 [ 385.596405] ? __lock_acquire+0x62f/0x4c20 [ 385.600646] ? mark_held_locks+0x130/0x130 [ 385.604889] ? mark_held_locks+0x130/0x130 [ 385.609134] ? rcu_read_lock_sched_held+0x14f/0x180 [ 385.614164] ? skb_release_data+0x880/0x880 [ 385.618491] ? mark_held_locks+0x130/0x130 [ 385.622725] ? print_usage_bug+0xc0/0xc0 [ 385.626790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.632347] ? mark_held_locks+0x130/0x130 [ 385.636586] ? zap_class+0x640/0x640 [ 385.640301] ? __lock_acquire+0x62f/0x4c20 [ 385.644537] ? find_held_lock+0x36/0x1c0 [ 385.648614] ? zap_class+0x640/0x640 [ 385.652330] ? zap_class+0x640/0x640 [ 385.656061] ipgre_xmit+0x679/0xba0 [ 385.659700] ? gre_tap_xmit+0x590/0x590 [ 385.663678] ? __lock_is_held+0xb5/0x140 [ 385.667761] dev_hard_start_xmit+0x295/0xc80 [ 385.672180] ? dev_direct_xmit+0x6b0/0x6b0 [ 385.676421] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 385.681965] ? netif_skb_features+0x690/0xb70 [ 385.686471] ? validate_xmit_xfrm+0x1ef/0xda0 [ 385.690979] ? validate_xmit_skb+0x80c/0xf30 [ 385.695400] ? netif_skb_features+0xb70/0xb70 [ 385.699907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.705452] ? check_preemption_disabled+0x48/0x280 [ 385.710476] ? check_preemption_disabled+0x48/0x280 [ 385.715507] __dev_queue_xmit+0x2f71/0x3ad0 [ 385.719938] ? save_stack+0x43/0xd0 [ 385.723566] ? kasan_kmalloc+0xc7/0xe0 [ 385.727458] ? __kmalloc_node_track_caller+0x50/0x70 [ 385.732575] ? netdev_pick_tx+0x310/0x310 [ 385.736724] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 385.741837] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 385.747309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.752854] ? check_preemption_disabled+0x48/0x280 [ 385.757888] ? __lock_is_held+0xb5/0x140 [ 385.761963] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 385.766988] ? skb_release_data+0x1c4/0x880 [ 385.771325] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 385.776608] ? kasan_unpoison_shadow+0x35/0x50 [ 385.781200] ? skb_tx_error+0x2f0/0x2f0 [ 385.785184] ? __kmalloc_node_track_caller+0x50/0x70 [ 385.790296] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 385.795837] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 385.801383] ? kasan_check_write+0x14/0x20 [ 385.805625] ? pskb_expand_head+0x6b3/0x10f0 [ 385.810076] ? skb_release_data+0x880/0x880 [ 385.814406] ? __alloc_skb+0x770/0x770 [ 385.818311] ? __lock_is_held+0xb5/0x140 [ 385.822383] ? kasan_check_write+0x14/0x20 [ 385.826619] ? __skb_clone+0x6c7/0xa00 [ 385.830512] ? __copy_skb_header+0x6b0/0x6b0 [ 385.834943] ? kmem_cache_alloc+0x33a/0x730 [ 385.839282] ? skb_ensure_writable+0x15e/0x640 [ 385.843876] dev_queue_xmit+0x17/0x20 [ 385.847684] ? dev_queue_xmit+0x17/0x20 [ 385.851662] __bpf_redirect+0x5cf/0xb20 [ 385.855652] bpf_clone_redirect+0x2f6/0x490 [ 385.859993] bpf_prog_e2ed69a7d397132f+0x2a8/0x1000 [ 385.865067] ? bpf_test_run+0x175/0x780 [ 385.869057] ? lock_downgrade+0x900/0x900 [ 385.873214] ? ktime_get+0x332/0x400 [ 385.876944] ? pvclock_read_flags+0x160/0x160 [ 385.881449] ? bpf_test_run+0x175/0x780 [ 385.885431] ? trace_hardirqs_off_caller+0x310/0x310 [ 385.890551] ? lock_acquire+0x1ed/0x520 [ 385.894531] ? bpf_test_run+0x3cb/0x780 [ 385.898518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 385.904068] ? check_preemption_disabled+0x48/0x280 [ 385.909101] ? kasan_check_read+0x11/0x20 [ 385.913252] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 385.918538] ? rcu_softirq_qs+0x20/0x20 [ 385.922521] ? bpf_cgroup_storage_release+0x220/0x220 [ 385.927717] ? skb_try_coalesce+0x1b70/0x1b70 [ 385.932231] ? bpf_test_run+0x25d/0x780 [ 385.936226] ? netlink_diag_dump+0x2a0/0x2a0 [ 385.940648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 385.946194] ? bpf_test_init.isra.10+0x70/0x100 [ 385.950875] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 385.955645] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 385.960495] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 385.966053] ? fput+0x130/0x1a0 [ 385.969341] ? __bpf_prog_get+0x9b/0x290 [ 385.973412] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 385.978258] ? bpf_prog_test_run+0x130/0x1a0 [ 385.982673] ? __x64_sys_bpf+0x3d8/0x520 [ 385.986735] ? bpf_prog_get+0x20/0x20 [ 385.990566] ? do_syscall_64+0x1b9/0x820 [ 385.994630] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 385.999997] ? syscall_return_slowpath+0x5e0/0x5e0 [ 386.004934] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.009786] ? trace_hardirqs_on_caller+0x310/0x310 [ 386.014815] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 386.019841] ? prepare_exit_to_usermode+0x291/0x3b0 [ 386.024868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.029725] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:24 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = getpid() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000480)={0x9, &(0x7f0000000400)=[{0x1, 0x2, 0x800, 0x1}, {0xfffffffffffffa96, 0x7, 0x3, 0x401}, {0x8, 0x1, 0x8, 0x8000}, {0x6, 0x1, 0x40000000000000, 0x10000}, {0x7, 0x2, 0x9, 0x9}, {0x34, 0xffff, 0x3f, 0x6}, {0x401, 0x100000000, 0x100000001, 0x8}, {0x42e4, 0xffff, 0x2, 0xfffffffffffffff9}, {0x3, 0x1, 0xc0, 0xb7f}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000600)={r2, 0x28, &(0x7f0000000100)}, 0x10) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0xfffffffffffffffd, 0x0, 0x4, 0xfffffffffffff3aa, 0x0, 0x3f, 0x40811, 0xd, 0x0, 0x3cb, 0x0, 0x1, 0x3ff, 0x6, 0x1, 0xffff, 0xf9f6, 0xffff, 0x29e, 0x4, 0x2, 0x3, 0x7f, 0x3ff, 0x8, 0x1ced, 0x81, 0x6, 0x9, 0x4, 0x4000000000000000, 0x7, 0x0, 0xffffffffffffff73, 0x8, 0xeb1, 0x0, 0xffffffffffffffc0, 0x3, @perf_bp={&(0x7f0000000080)}, 0x4004, 0x1, 0x7, 0x2, 0x9, 0x7, 0x8001}, r1, 0x7, 0xffffffffffffffff, 0xa) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb70200010300000000000000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='GPL\x00') r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r4, r3, 0xa, 0x2}, 0x10) recvmsg(r2, &(0x7f0000000bc0)={&(0x7f0000000980)=@can, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000a00)=""/138, 0x8a}, {&(0x7f0000000ac0)=""/186, 0xba}], 0x2, 0x0, 0x0, 0x7}, 0x0) recvmsg$kcm(r2, &(0x7f0000002d00)={&(0x7f0000002a80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002b00)=""/170, 0xaa}], 0x1, &(0x7f0000002c00)=""/239, 0xef, 0x8}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000002d40)={0x4, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000fb0f2000ffffffff00200000000000b71d53b3ff140000000000000000000000d7500000fcffffff000000000000000017e8500000000000000000000000000018000000feffffff00000000018000009500000000000000"], &(0x7f0000000500)='GPL\x00', 0x6, 0xb3, &(0x7f0000000540)=""/179, 0x41f00, 0x1, [], r5, 0x7}, 0x48) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNGETFEATURES(r6, 0x800454cf, &(0x7f0000000300)) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000a080)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000009f00), 0x0, &(0x7f0000009fc0)=""/147, 0x93}, 0x0) socketpair(0x3, 0x5, 0x6, &(0x7f0000000040)) 12:06:24 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000f0ffff0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)="6367726f75702e737562747265655f636f6e74726f6cff", 0x2, 0x0) 12:06:24 executing program 2 (fault-call:3 fault-nth:6): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 386.205886] FAULT_INJECTION: forcing a failure. [ 386.205886] name failslab, interval 1, probability 0, space 0, times 0 [ 386.217281] CPU: 1 PID: 23180 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 386.224570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.233936] Call Trace: [ 386.236548] dump_stack+0x244/0x39d [ 386.240191] ? dump_stack_print_info.cold.1+0x20/0x20 [ 386.245397] ? __lock_acquire+0x62f/0x4c20 [ 386.249652] should_fail.cold.4+0xa/0x17 [ 386.253715] ? print_usage_bug+0xc0/0xc0 [ 386.257804] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 386.262916] ? __lock_acquire+0x62f/0x4c20 [ 386.267172] ? __lock_acquire+0x62f/0x4c20 [ 386.271419] ? mark_held_locks+0x130/0x130 [ 386.275662] ? update_load_avg+0x387/0x2470 [ 386.280022] ? zap_class+0x640/0x640 [ 386.283762] ? print_usage_bug+0xc0/0xc0 [ 386.287838] ? zap_class+0x640/0x640 [ 386.291567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.297110] ? check_preemption_disabled+0x48/0x280 [ 386.302161] ? __lock_is_held+0xb5/0x140 [ 386.306250] __should_failslab+0x124/0x180 [ 386.310508] should_failslab+0x9/0x14 [ 386.314332] kmem_cache_alloc+0x47/0x730 [ 386.318412] ? ip_mc_drop_socket+0x270/0x270 [ 386.322835] dst_alloc+0xbb/0x1d0 [ 386.326294] rt_dst_alloc+0x105/0x540 [ 386.330099] ? fnhe_flush_routes+0x480/0x480 [ 386.334513] ? __lock_is_held+0xb5/0x140 [ 386.338591] ip_route_output_key_hash_rcu+0xa57/0x3490 [ 386.343871] ? depot_save_stack+0x292/0x470 [ 386.348204] ? ip_route_input_noref+0x260/0x260 [ 386.352878] ? kasan_check_read+0x11/0x20 [ 386.357033] ? do_raw_spin_unlock+0xa7/0x330 [ 386.361452] ? trace_hardirqs_on+0x310/0x310 [ 386.365865] ? unwind_get_return_address+0x61/0xa0 [ 386.370814] ? lock_acquire+0x1ed/0x520 [ 386.374793] ? ip_route_output_key_hash+0x1ab/0x3b0 [ 386.379828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.385370] ? check_preemption_disabled+0x48/0x280 [ 386.390394] ? kasan_check_read+0x11/0x20 [ 386.394542] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 386.399825] ? pskb_expand_head+0x3bb/0x10f0 [ 386.404240] ? rcu_softirq_qs+0x20/0x20 [ 386.408213] ? dev_queue_xmit+0x17/0x20 [ 386.412196] ? bpf_prog_e2ed69a7d397132f+0xb2d/0x1000 [ 386.417395] ? trace_hardirqs_off+0xb8/0x310 [ 386.421836] ip_route_output_key_hash+0x240/0x3b0 [ 386.426703] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 386.432251] ? kfree+0x11e/0x230 [ 386.435626] ip_route_output_flow+0x28/0xc0 [ 386.439971] ip_tunnel_xmit+0x19a8/0x3c04 [ 386.444135] ? ip_tunnel_init_net+0xac0/0xac0 [ 386.448632] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 386.453481] ? kasan_check_write+0x14/0x20 [ 386.457720] ? pskb_expand_head+0x6b3/0x10f0 [ 386.462138] ? __lock_acquire+0x62f/0x4c20 [ 386.466388] ? mark_held_locks+0x130/0x130 [ 386.470636] ? mark_held_locks+0x130/0x130 [ 386.474888] ? skb_release_data+0x880/0x880 [ 386.479215] ? mark_held_locks+0x130/0x130 [ 386.483461] ? mark_held_locks+0x130/0x130 [ 386.487707] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.493251] __gre_xmit+0x5e1/0x980 [ 386.496898] ipgre_xmit+0x3e7/0xba0 [ 386.500537] ? gre_tap_xmit+0x590/0x590 [ 386.504520] ? __lock_is_held+0xb5/0x140 [ 386.508599] dev_hard_start_xmit+0x295/0xc80 [ 386.513016] ? dev_direct_xmit+0x6b0/0x6b0 [ 386.517270] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.522820] ? netif_skb_features+0x690/0xb70 [ 386.527324] ? validate_xmit_xfrm+0x1ef/0xda0 [ 386.531847] ? validate_xmit_skb+0x80c/0xf30 [ 386.536263] ? netif_skb_features+0xb70/0xb70 [ 386.540767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.546316] ? check_preemption_disabled+0x48/0x280 [ 386.551339] ? check_preemption_disabled+0x48/0x280 [ 386.556364] __dev_queue_xmit+0x2f71/0x3ad0 [ 386.560697] ? save_stack+0x43/0xd0 [ 386.564332] ? kasan_kmalloc+0xc7/0xe0 [ 386.568230] ? __kmalloc_node_track_caller+0x50/0x70 [ 386.573351] ? netdev_pick_tx+0x310/0x310 [ 386.577498] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 386.582601] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 386.587710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.593251] ? check_preemption_disabled+0x48/0x280 [ 386.598283] ? __lock_is_held+0xb5/0x140 [ 386.602358] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 386.607378] ? skb_release_data+0x1c4/0x880 [ 386.611706] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 386.616986] ? kasan_unpoison_shadow+0x35/0x50 [ 386.621570] ? skb_tx_error+0x2f0/0x2f0 [ 386.625559] ? __kmalloc_node_track_caller+0x50/0x70 [ 386.630672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 386.636211] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 386.641758] ? kasan_check_write+0x14/0x20 [ 386.645996] ? pskb_expand_head+0x6b3/0x10f0 [ 386.650431] ? skb_release_data+0x880/0x880 [ 386.654754] ? __alloc_skb+0x770/0x770 [ 386.658654] ? __lock_is_held+0xb5/0x140 [ 386.662724] ? kasan_check_write+0x14/0x20 [ 386.666959] ? __skb_clone+0x6c7/0xa00 [ 386.670852] ? __copy_skb_header+0x6b0/0x6b0 [ 386.675263] ? kmem_cache_alloc+0x33a/0x730 [ 386.679597] ? skb_ensure_writable+0x15e/0x640 [ 386.684192] dev_queue_xmit+0x17/0x20 [ 386.687997] ? dev_queue_xmit+0x17/0x20 [ 386.691984] __bpf_redirect+0x5cf/0xb20 [ 386.695970] bpf_clone_redirect+0x2f6/0x490 [ 386.700306] bpf_prog_e2ed69a7d397132f+0xb2d/0x1000 [ 386.705330] ? bpf_test_run+0x175/0x780 [ 386.709316] ? lock_downgrade+0x900/0x900 [ 386.713990] ? ktime_get+0x332/0x400 [ 386.717723] ? pvclock_read_flags+0x160/0x160 [ 386.722219] ? bpf_test_run+0x175/0x780 [ 386.726202] ? trace_hardirqs_off_caller+0x310/0x310 [ 386.731316] ? lock_acquire+0x1ed/0x520 [ 386.735296] ? bpf_test_run+0x3cb/0x780 [ 386.739282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 386.744828] ? check_preemption_disabled+0x48/0x280 [ 386.749859] ? kasan_check_read+0x11/0x20 [ 386.754011] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 386.759303] ? rcu_softirq_qs+0x20/0x20 [ 386.763280] ? bpf_cgroup_storage_release+0x220/0x220 [ 386.768478] ? skb_try_coalesce+0x1b70/0x1b70 [ 386.772988] ? bpf_test_run+0x25d/0x780 [ 386.776975] ? netlink_diag_dump+0x2a0/0x2a0 [ 386.781391] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 386.786929] ? bpf_test_init.isra.10+0x70/0x100 [ 386.791604] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 386.796371] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 386.801214] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 386.806757] ? fput+0x130/0x1a0 [ 386.810063] ? __bpf_prog_get+0x9b/0x290 [ 386.814128] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 386.818974] ? bpf_prog_test_run+0x130/0x1a0 [ 386.823389] ? __x64_sys_bpf+0x3d8/0x520 [ 386.827451] ? bpf_prog_get+0x20/0x20 [ 386.831277] ? do_syscall_64+0x1b9/0x820 [ 386.835339] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 386.840711] ? syscall_return_slowpath+0x5e0/0x5e0 [ 386.845639] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.850486] ? trace_hardirqs_on_caller+0x310/0x310 [ 386.855508] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 386.860532] ? prepare_exit_to_usermode+0x291/0x3b0 [ 386.865558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.870413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x5, 0x84) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0xfd8a, &(0x7f0000000580)=[{&(0x7f0000000400)}], 0x1, &(0x7f0000000040)=[{0xf0, 0x29, 0x1000, "888f213c6de1386f0cb63b240d60d2c35dbd90988a28a38ce4cc2f98798d302811b845b5d5db4cddcfe2f2fb3e72d7f44540b841a4f8f8e4f706dc1b5b3b90907a0d9b1255b070d6c3a27892198ae11928a6d62c2f930fe9d8f5598afca957ea650f271329f9c0716800ea61a8bf0958f28c4376d33db5054f461dc392a45dae411789207dad06d863d7d67930d577f16c099fa71944478dd20262061bb45cf1410cc04514a16e99fc294b5ab269f9023cee9dbb579b827cdba85864c0fa82a93317dbe5f67d9533d152a15b3a66fc7c9f9d2a87d5302371b1"}], 0xf0}, 0x0) 12:06:25 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000180000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000002c0)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r0, 0x0, 0x5e, &(0x7f0000000300)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c00", 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x1, 0x6, 0x5, 0x2, 0x0, 0x2, 0x4, 0xa, 0x9, 0x8, 0x1f, 0x3f, 0x0, 0x9, 0x25, 0x593, 0x4, 0xcf, 0x9, 0x7, 0x8, 0x100000000, 0xe6a, 0x6520, 0x5, 0xffffffffffffffc1, 0x7f, 0x6, 0x7, 0xb0f, 0x94, 0x62e, 0x2, 0x7b8540c2, 0x3, 0x7, 0x0, 0x40, 0x0, @perf_bp={&(0x7f0000000040)}, 0x10000, 0x0, 0x9, 0x0, 0x0, 0x7fff, 0x40}, r3, 0x7, r0, 0xb) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) openat$cgroup_ro(r4, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x7fffff) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x5, 0x0, 0x9, 0x0, 0x1, 0x20000, 0x0, 0x200, 0x0, 0xc3, 0x7, 0x0, 0xfffffffffffffffd, 0x800, 0x1f, 0x1000000000000000, 0x8, 0x4c, 0x100000001, 0x1, 0x0, 0x100000000, 0x8, 0x9, 0x800, 0x6, 0xff, 0x0, 0x87, 0x5, 0x100, 0x4, 0x10001, 0xffffffffffffffb0, 0x100000001, 0x0, 0x46, 0x2, @perf_config_ext={0x7ff, 0x1}, 0x0, 0x1, 0x1ff, 0x7, 0x9, 0xffffffff, 0x5}, 0xffffffffffffffff, 0x5, r2, 0x8) 12:06:25 executing program 2 (fault-call:3 fault-nth:7): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:25 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000280)) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x2, 0x71e091096aeefb43, 0x0) sendmsg(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x62, &(0x7f0000002500), 0x0, &(0x7f0000000180)}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000542fe2d1daf214c300000000000000000000000095080000db6ef5aa18158364a56811dbb6838ff74f7d41cb2fc836b82a309a82338e5f6a6b5eab1e3680103d93ecc85051474ccf8793016537bd3d49e27e167baf067d592ce14232cf8478036c1f19f692c6bd8074d89af09c411f2e406b471ca771a28ff4465c5025cbdf879526088233018575b8cdba06"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_type(r3, &(0x7f0000000340)='threaded\x00', 0x9) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={0xffffffffffffffff, r1}) r4 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x70, 0x6, 0xffffffffffffff9f, 0x8, 0xfffffffffffffeff, 0x0, 0x3, 0xa800, 0xb, 0xf9bf, 0x1, 0x5, 0xffffffff, 0x200, 0x1, 0x2, 0x811, 0x83, 0xfff, 0xd97, 0x1, 0x1, 0xffffffffffff22c3, 0xce7f, 0x3, 0x7, 0x7fff, 0x1, 0x9, 0x0, 0xff19, 0x2c4, 0x2, 0x100000000, 0x4, 0x7fffffff, 0x2, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000380), 0x1}, 0x0, 0x1, 0xffffffff80000001, 0x3, 0x1, 0x200, 0xbf76}, r4, 0x3, r3, 0xd) openat$cgroup_ro(r4, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x5656, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000002c0)={r0}) recvmsg(0xffffffffffffffff, &(0x7f00000031c0)={&(0x7f0000001e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000003140)=[{&(0x7f0000001f00)=""/23, 0x17}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x6, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9d8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) [ 387.368117] FAULT_INJECTION: forcing a failure. [ 387.368117] name failslab, interval 1, probability 0, space 0, times 0 [ 387.379456] CPU: 1 PID: 23200 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 387.386746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.396119] Call Trace: [ 387.398739] dump_stack+0x244/0x39d [ 387.402396] ? dump_stack_print_info.cold.1+0x20/0x20 [ 387.407612] ? get_page_from_freelist+0x2cf2/0x5340 [ 387.412660] should_fail.cold.4+0xa/0x17 [ 387.416732] ? __lock_acquire+0x62f/0x4c20 [ 387.420974] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 387.426097] ? zap_class+0x640/0x640 [ 387.429825] ? is_bpf_text_address+0xac/0x170 [ 387.434336] ? find_held_lock+0x36/0x1c0 [ 387.438411] ? __nf_conntrack_find_get.part.44+0x10de/0x1cf0 [ 387.444213] ? lock_downgrade+0x900/0x900 [ 387.448364] ? check_preemption_disabled+0x48/0x280 [ 387.453385] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 387.458319] ? kasan_check_read+0x11/0x20 [ 387.462470] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 387.467752] __should_failslab+0x124/0x180 [ 387.472002] should_failslab+0x9/0x14 [ 387.475815] kmem_cache_alloc+0x47/0x730 [ 387.479889] ? __nf_conntrack_find_get.part.44+0x1105/0x1cf0 [ 387.485694] __nf_conntrack_alloc+0x1aa/0x7c0 [ 387.490197] ? early_drop+0xc40/0xc40 [ 387.494002] ? __local_bh_enable_ip+0x160/0x260 [ 387.498676] ? __local_bh_enable_ip+0x160/0x260 [ 387.503351] ? lockdep_hardirqs_on+0x296/0x5b0 [ 387.507939] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 387.513133] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 387.518678] init_conntrack.isra.47+0xff6/0x13c0 [ 387.523438] ? __lock_acquire+0x62f/0x4c20 [ 387.527678] ? rt_add_uncached_list+0x1e1/0x280 [ 387.532351] ? nf_conntrack_alloc+0x50/0x50 [ 387.536676] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 387.541877] ? lock_acquire+0x1ed/0x520 [ 387.545851] ? nf_conntrack_in+0x5de/0x13b0 [ 387.550179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.555723] ? check_preemption_disabled+0x48/0x280 [ 387.560750] ? kasan_check_read+0x11/0x20 [ 387.564929] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 387.570221] ? trace_hardirqs_off_caller+0x310/0x310 [ 387.575335] nf_conntrack_in+0xc7d/0x13b0 [ 387.579512] ? nf_conntrack_update+0xbc0/0xbc0 [ 387.584271] ? __do_replace+0xab0/0xab0 [ 387.588251] ? zap_class+0x640/0x640 [ 387.591974] ? lock_acquire+0x130/0x520 [ 387.595968] ? nf_ct_l4proto_unregister_sysctl.isra.16+0x130/0x130 [ 387.602290] ipv4_conntrack_local+0x16a/0x220 [ 387.606792] nf_hook_slow+0xc2/0x1c0 [ 387.610532] __ip_local_out+0x56e/0xb30 [ 387.614511] ? ip_finish_output+0xfa0/0xfa0 [ 387.618841] ? __ip_flush_pending_frames.isra.44+0x2d0/0x2d0 [ 387.624646] ? __ip_select_ident+0x16d/0x2a0 [ 387.629068] ? ip_idents_reserve+0x320/0x320 [ 387.633484] ip_local_out+0x2d/0x1b0 [ 387.637205] iptunnel_xmit+0x56a/0x8d0 [ 387.641108] ip_tunnel_xmit+0x15b8/0x3c04 [ 387.645277] ? ip_tunnel_init_net+0xac0/0xac0 [ 387.649776] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 387.654629] ? kasan_check_write+0x14/0x20 [ 387.658870] ? pskb_expand_head+0x6b3/0x10f0 [ 387.663279] ? __lock_acquire+0x62f/0x4c20 [ 387.667513] ? mark_held_locks+0x130/0x130 [ 387.671752] ? mark_held_locks+0x130/0x130 [ 387.676001] ? skb_release_data+0x880/0x880 [ 387.680345] ? mark_held_locks+0x130/0x130 [ 387.684590] ? print_usage_bug+0xc0/0xc0 [ 387.688669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.694231] ? mark_held_locks+0x130/0x130 [ 387.698483] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 387.704051] __gre_xmit+0x5e1/0x980 [ 387.707704] ipgre_xmit+0x3e7/0xba0 [ 387.711341] ? gre_tap_xmit+0x590/0x590 [ 387.715830] ? __lock_is_held+0xb5/0x140 [ 387.719915] dev_hard_start_xmit+0x295/0xc80 [ 387.724335] ? dev_direct_xmit+0x6b0/0x6b0 [ 387.728582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 387.734126] ? netif_skb_features+0x690/0xb70 [ 387.738637] ? validate_xmit_xfrm+0x1ef/0xda0 [ 387.743152] ? validate_xmit_skb+0x80c/0xf30 [ 387.747593] ? netif_skb_features+0xb70/0xb70 [ 387.752115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.757663] ? check_preemption_disabled+0x48/0x280 [ 387.762685] ? check_preemption_disabled+0x48/0x280 [ 387.767712] __dev_queue_xmit+0x2f71/0x3ad0 [ 387.772065] ? save_stack+0x43/0xd0 [ 387.775697] ? kasan_kmalloc+0xc7/0xe0 [ 387.779589] ? __kmalloc_node_track_caller+0x50/0x70 [ 387.784703] ? netdev_pick_tx+0x310/0x310 [ 387.788853] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 387.793977] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 387.799089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.804636] ? check_preemption_disabled+0x48/0x280 [ 387.809669] ? __lock_is_held+0xb5/0x140 [ 387.813741] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 387.818765] ? skb_release_data+0x1c4/0x880 [ 387.823098] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 387.828382] ? kasan_unpoison_shadow+0x35/0x50 [ 387.832974] ? skb_tx_error+0x2f0/0x2f0 [ 387.836961] ? __kmalloc_node_track_caller+0x50/0x70 [ 387.842072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 387.847613] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 387.853157] ? kasan_check_write+0x14/0x20 [ 387.857397] ? pskb_expand_head+0x6b3/0x10f0 [ 387.861828] ? skb_release_data+0x880/0x880 [ 387.866154] ? __alloc_skb+0x770/0x770 [ 387.870063] ? __lock_is_held+0xb5/0x140 [ 387.874138] ? kasan_check_write+0x14/0x20 [ 387.878376] ? __skb_clone+0x6c7/0xa00 [ 387.882269] ? __copy_skb_header+0x6b0/0x6b0 [ 387.886679] ? kmem_cache_alloc+0x33a/0x730 [ 387.891016] ? skb_ensure_writable+0x15e/0x640 [ 387.895618] dev_queue_xmit+0x17/0x20 [ 387.899419] ? dev_queue_xmit+0x17/0x20 [ 387.903398] __bpf_redirect+0x5cf/0xb20 [ 387.907386] bpf_clone_redirect+0x2f6/0x490 [ 387.911727] bpf_prog_e2ed69a7d397132f+0xcba/0x1000 [ 387.916745] ? bpf_test_run+0x175/0x780 [ 387.920728] ? lock_downgrade+0x900/0x900 [ 387.924879] ? ktime_get+0x332/0x400 [ 387.928610] ? pvclock_read_flags+0x160/0x160 [ 387.933103] ? bpf_test_run+0x175/0x780 [ 387.937081] ? trace_hardirqs_off_caller+0x310/0x310 [ 387.942196] ? lock_acquire+0x1ed/0x520 [ 387.946175] ? bpf_test_run+0x3cb/0x780 [ 387.950155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 387.955695] ? check_preemption_disabled+0x48/0x280 [ 387.960725] ? kasan_check_read+0x11/0x20 [ 387.964878] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 387.970159] ? rcu_softirq_qs+0x20/0x20 [ 387.974132] ? bpf_cgroup_storage_release+0x220/0x220 [ 387.979328] ? skb_try_coalesce+0x1b70/0x1b70 [ 387.983854] ? bpf_test_run+0x25d/0x780 [ 387.987845] ? netlink_diag_dump+0x2a0/0x2a0 [ 387.992263] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 387.997810] ? bpf_test_init.isra.10+0x70/0x100 [ 388.002488] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 388.007255] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 388.012098] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 388.017639] ? fput+0x130/0x1a0 [ 388.020925] ? __bpf_prog_get+0x9b/0x290 [ 388.024993] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 388.029845] ? bpf_prog_test_run+0x130/0x1a0 [ 388.034260] ? __x64_sys_bpf+0x3d8/0x520 [ 388.038324] ? bpf_prog_get+0x20/0x20 [ 388.042151] ? do_syscall_64+0x1b9/0x820 [ 388.046214] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 388.051584] ? syscall_return_slowpath+0x5e0/0x5e0 [ 388.056514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.061366] ? trace_hardirqs_on_caller+0x310/0x310 [ 388.066386] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:06:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000006000, 0x19c, 0x29, &(0x7f0000001bc0)="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", &(0x7f0000000400)=""/41, 0x100}, 0x28) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000600)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000640)) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000004c0)={'irlan0\x00', 0x600}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000680)=@xdp, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000700)=""/214, 0xd6}, {&(0x7f0000000800)=""/77, 0x4d}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001a00)=""/133, 0x85}], 0x4, 0x0, 0x0, 0x40}, 0x0) 12:06:26 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 388.071407] ? prepare_exit_to_usermode+0x291/0x3b0 [ 388.076434] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.081290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000500000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:26 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:26 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000040000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:26 executing program 2 (fault-call:3 fault-nth:8): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:26 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)="6367726f75702e737562747265655f636f6e74726f6c04", 0x2, 0x0) 12:06:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0x5, 0x20264) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x1a4924ff, &(0x7f0000000000)={0x0, 0x0}}, 0x16f) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2, 0x92}, 0xc) [ 388.418790] FAULT_INJECTION: forcing a failure. [ 388.418790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 388.430768] CPU: 1 PID: 23232 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 388.438072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.447440] Call Trace: [ 388.450065] dump_stack+0x244/0x39d [ 388.453723] ? dump_stack_print_info.cold.1+0x20/0x20 [ 388.458952] should_fail.cold.4+0xa/0x17 [ 388.463052] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 388.468188] ? mark_held_locks+0x130/0x130 [ 388.472446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.478003] ? check_preemption_disabled+0x48/0x280 [ 388.483077] ? zap_class+0x640/0x640 [ 388.486818] ? __lock_acquire+0x62f/0x4c20 [ 388.491074] ? __pagevec_lru_add+0x30/0x30 [ 388.495321] ? __update_load_avg_blocked_se+0x690/0x690 [ 388.500701] ? zap_class+0x640/0x640 [ 388.504435] ? trace_hardirqs_off+0xb8/0x310 [ 388.508874] __alloc_pages_nodemask+0x34b/0xde0 [ 388.513560] ? __alloc_pages_slowpath+0x2e10/0x2e10 [ 388.518589] ? lock_downgrade+0x900/0x900 [ 388.522753] ? check_preemption_disabled+0x48/0x280 [ 388.527787] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 388.532737] ? kasan_check_read+0x11/0x20 [ 388.536898] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 388.542195] ? unwind_dump+0x190/0x190 [ 388.546109] ? is_bpf_text_address+0xd3/0x170 [ 388.550621] ? kernel_text_address+0x79/0xf0 [ 388.555150] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 388.560709] alloc_pages_current+0x173/0x350 [ 388.565137] depot_save_stack+0x3f1/0x470 [ 388.569308] save_stack+0xa9/0xd0 [ 388.572777] ? save_stack+0x43/0xd0 [ 388.576421] ? kasan_kmalloc+0xc7/0xe0 [ 388.580317] ? kasan_slab_alloc+0x12/0x20 [ 388.584477] ? kmem_cache_alloc+0x12e/0x730 [ 388.588814] ? dst_alloc+0xbb/0x1d0 [ 388.592450] ? rt_dst_alloc+0x105/0x540 [ 388.596435] ? ip_route_output_key_hash_rcu+0xa57/0x3490 [ 388.601900] ? ip_route_output_key_hash+0x240/0x3b0 [ 388.607016] ? ip_route_output_flow+0x28/0xc0 [ 388.611539] ? ip_tunnel_xmit+0x19a8/0x3c04 [ 388.615871] ? __gre_xmit+0x5e1/0x980 [ 388.619685] ? ipgre_xmit+0x3e7/0xba0 [ 388.623499] ? dev_hard_start_xmit+0x295/0xc80 [ 388.628092] ? __dev_queue_xmit+0x2f71/0x3ad0 [ 388.632600] ? dev_queue_xmit+0x17/0x20 [ 388.636583] ? __bpf_redirect+0x5cf/0xb20 [ 388.640739] ? bpf_clone_redirect+0x2f6/0x490 [ 388.645247] ? bpf_prog_e2ed69a7d397132f+0x7f2/0x1000 [ 388.650460] ? zap_class+0x640/0x640 [ 388.654194] ? print_usage_bug+0xc0/0xc0 [ 388.658270] ? zap_class+0x640/0x640 [ 388.662005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.667572] ? kmem_cache_alloc+0x283/0x730 [ 388.671905] ? kmem_cache_alloc+0x283/0x730 [ 388.676243] ? lockdep_hardirqs_on+0x296/0x5b0 [ 388.680851] ? trace_hardirqs_on+0xbd/0x310 [ 388.685190] ? __lock_is_held+0xb5/0x140 [ 388.689270] ? dst_alloc+0xbb/0x1d0 [ 388.692912] ? trace_hardirqs_off_caller+0x310/0x310 [ 388.698041] ? kasan_unpoison_shadow+0x35/0x50 [ 388.702643] kasan_kmalloc+0xc7/0xe0 [ 388.706374] ? check_preemption_disabled+0x48/0x280 [ 388.711412] kasan_slab_alloc+0x12/0x20 [ 388.715918] kmem_cache_alloc+0x12e/0x730 [ 388.720088] ? ip_mc_drop_socket+0x270/0x270 [ 388.724520] dst_alloc+0xbb/0x1d0 [ 388.727991] rt_dst_alloc+0x105/0x540 [ 388.731820] ? fnhe_flush_routes+0x480/0x480 [ 388.736246] ? __lock_is_held+0xb5/0x140 [ 388.740332] ip_route_output_key_hash_rcu+0xa57/0x3490 [ 388.745628] ? depot_save_stack+0x292/0x470 [ 388.749968] ? ip_route_input_noref+0x260/0x260 [ 388.754648] ? kasan_check_read+0x11/0x20 [ 388.758821] ? do_raw_spin_unlock+0xa7/0x330 [ 388.763241] ? trace_hardirqs_on+0x310/0x310 [ 388.767659] ? unwind_get_return_address+0x61/0xa0 [ 388.772613] ? lock_acquire+0x1ed/0x520 [ 388.776595] ? ip_route_output_key_hash+0x1ab/0x3b0 [ 388.781629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.787183] ? check_preemption_disabled+0x48/0x280 [ 388.792216] ? kasan_check_read+0x11/0x20 [ 388.796376] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 388.801660] ? pskb_expand_head+0x3bb/0x10f0 [ 388.806078] ? rcu_softirq_qs+0x20/0x20 [ 388.810062] ? dev_queue_xmit+0x17/0x20 [ 388.814055] ? bpf_prog_e2ed69a7d397132f+0x7f2/0x1000 [ 388.819261] ? trace_hardirqs_off+0xb8/0x310 [ 388.823687] ip_route_output_key_hash+0x240/0x3b0 [ 388.828541] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 388.834095] ? kfree+0x11e/0x230 [ 388.837473] ip_route_output_flow+0x28/0xc0 [ 388.841812] ip_tunnel_xmit+0x19a8/0x3c04 [ 388.845978] ? ip_tunnel_init_net+0xac0/0xac0 [ 388.850484] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 388.855339] ? kasan_check_write+0x14/0x20 [ 388.859703] ? pskb_expand_head+0x6b3/0x10f0 [ 388.864120] ? __lock_acquire+0x62f/0x4c20 [ 388.868361] ? mark_held_locks+0x130/0x130 [ 388.872609] ? mark_held_locks+0x130/0x130 [ 388.876859] ? skb_release_data+0x880/0x880 [ 388.881192] ? mark_held_locks+0x130/0x130 [ 388.885431] ? print_usage_bug+0xc0/0xc0 [ 388.889505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.895068] ? mark_held_locks+0x130/0x130 [ 388.899316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 388.904876] __gre_xmit+0x5e1/0x980 [ 388.908527] ipgre_xmit+0x3e7/0xba0 [ 388.912169] ? gre_tap_xmit+0x590/0x590 [ 388.916157] ? __lock_is_held+0xb5/0x140 [ 388.920245] dev_hard_start_xmit+0x295/0xc80 [ 388.924671] ? dev_direct_xmit+0x6b0/0x6b0 [ 388.928919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 388.934469] ? netif_skb_features+0x690/0xb70 [ 388.938983] ? validate_xmit_xfrm+0x1ef/0xda0 [ 388.943497] ? validate_xmit_skb+0x80c/0xf30 [ 388.947925] ? netif_skb_features+0xb70/0xb70 [ 388.952433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 388.957983] ? check_preemption_disabled+0x48/0x280 [ 388.963053] ? check_preemption_disabled+0x48/0x280 [ 388.968098] __dev_queue_xmit+0x2f71/0x3ad0 [ 388.972438] ? save_stack+0x43/0xd0 [ 388.976075] ? kasan_kmalloc+0xc7/0xe0 [ 388.980013] ? __kmalloc_node_track_caller+0x50/0x70 [ 388.985153] ? netdev_pick_tx+0x310/0x310 [ 388.989313] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 388.994435] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 388.999562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.005114] ? check_preemption_disabled+0x48/0x280 [ 389.010153] ? __lock_is_held+0xb5/0x140 [ 389.014237] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 389.019268] ? skb_release_data+0x1c4/0x880 [ 389.023611] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 389.028899] ? kasan_unpoison_shadow+0x35/0x50 [ 389.033493] ? skb_tx_error+0x2f0/0x2f0 [ 389.037480] ? __kmalloc_node_track_caller+0x50/0x70 [ 389.042603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.048170] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 389.053736] ? kasan_check_write+0x14/0x20 [ 389.057996] ? pskb_expand_head+0x6b3/0x10f0 [ 389.062445] ? skb_release_data+0x880/0x880 [ 389.066784] ? __alloc_skb+0x770/0x770 [ 389.070701] ? __lock_is_held+0xb5/0x140 [ 389.074778] ? kasan_check_write+0x14/0x20 [ 389.079022] ? __skb_clone+0x6c7/0xa00 [ 389.082930] ? __copy_skb_header+0x6b0/0x6b0 [ 389.087345] ? kmem_cache_alloc+0x33a/0x730 [ 389.091686] ? skb_ensure_writable+0x15e/0x640 [ 389.096285] dev_queue_xmit+0x17/0x20 [ 389.100091] ? dev_queue_xmit+0x17/0x20 [ 389.104072] __bpf_redirect+0x5cf/0xb20 [ 389.108071] bpf_clone_redirect+0x2f6/0x490 [ 389.112414] bpf_prog_e2ed69a7d397132f+0x7f2/0x1000 [ 389.117440] ? bpf_test_run+0x175/0x780 [ 389.121426] ? lock_downgrade+0x900/0x900 [ 389.125581] ? ktime_get+0x332/0x400 [ 389.129317] ? pvclock_read_flags+0x160/0x160 [ 389.133847] ? bpf_test_run+0x175/0x780 [ 389.137836] ? trace_hardirqs_off_caller+0x310/0x310 [ 389.142961] ? lock_acquire+0x1ed/0x520 [ 389.146946] ? bpf_test_run+0x3cb/0x780 [ 389.150935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.156485] ? check_preemption_disabled+0x48/0x280 [ 389.161517] ? kasan_check_read+0x11/0x20 [ 389.165670] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 389.170952] ? rcu_softirq_qs+0x20/0x20 [ 389.174930] ? bpf_cgroup_storage_release+0x220/0x220 [ 389.180129] ? skb_try_coalesce+0x1b70/0x1b70 [ 389.184644] ? bpf_test_run+0x25d/0x780 [ 389.188642] ? netlink_diag_dump+0x2a0/0x2a0 [ 389.193074] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.198621] ? bpf_test_init.isra.10+0x70/0x100 [ 389.203300] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 389.208081] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 389.212933] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 389.218478] ? fput+0x130/0x1a0 [ 389.221765] ? __bpf_prog_get+0x9b/0x290 [ 389.225840] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 389.230687] ? bpf_prog_test_run+0x130/0x1a0 [ 389.235108] ? __x64_sys_bpf+0x3d8/0x520 [ 389.239174] ? bpf_prog_get+0x20/0x20 [ 389.243002] ? do_syscall_64+0x1b9/0x820 [ 389.247082] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 389.252453] ? syscall_return_slowpath+0x5e0/0x5e0 [ 389.257390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.262242] ? trace_hardirqs_on_caller+0x310/0x310 [ 389.267266] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:06:27 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000e00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 389.272293] ? prepare_exit_to_usermode+0x291/0x3b0 [ 389.277327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.282184] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:27 executing program 2 (fault-call:3 fault-nth:9): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 389.399860] FAULT_INJECTION: forcing a failure. [ 389.399860] name failslab, interval 1, probability 0, space 0, times 0 [ 389.411383] CPU: 0 PID: 23245 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 389.418679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.428046] Call Trace: [ 389.430648] dump_stack+0x244/0x39d [ 389.434290] ? dump_stack_print_info.cold.1+0x20/0x20 [ 389.439501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.445064] should_fail.cold.4+0xa/0x17 [ 389.449141] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 389.454248] ? __perf_event_task_sched_out+0x33a/0x1bf0 [ 389.459625] ? pick_next_task_fair+0xa05/0x1b30 [ 389.464317] ? rcu_read_lock_sched_held+0x14f/0x180 [ 389.469611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.475166] ? print_usage_bug+0xc0/0xc0 [ 389.479237] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.484780] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 389.489999] ? __lock_acquire+0x62f/0x4c20 [ 389.494254] ? finish_task_switch+0x1f4/0x910 [ 389.498763] ? _raw_spin_unlock_irq+0x27/0x80 [ 389.503269] ? _raw_spin_unlock_irq+0x27/0x80 [ 389.507786] __should_failslab+0x124/0x180 [ 389.512118] should_failslab+0x9/0x14 [ 389.515926] kmem_cache_alloc+0x47/0x730 [ 389.520005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.525559] skb_clone+0x1bb/0x500 [ 389.529105] ? finish_task_switch+0x1b4/0x910 [ 389.533606] ? skb_split+0x11e0/0x11e0 [ 389.537499] ? preempt_notifier_register+0x200/0x200 [ 389.542605] ? __switch_to_asm+0x34/0x70 [ 389.546665] ? __switch_to_asm+0x34/0x70 [ 389.550726] ? __switch_to_asm+0x40/0x70 [ 389.554783] ? __switch_to_asm+0x34/0x70 [ 389.558843] ? __switch_to_asm+0x40/0x70 [ 389.562903] ? __switch_to_asm+0x34/0x70 [ 389.566962] ? __switch_to_asm+0x40/0x70 [ 389.571023] ? __switch_to_asm+0x34/0x70 [ 389.575096] ? __switch_to_asm+0x34/0x70 [ 389.579154] ? __switch_to_asm+0x40/0x70 [ 389.583439] ? __switch_to_asm+0x34/0x70 [ 389.587515] bpf_clone_redirect+0xb9/0x490 [ 389.591756] ? __schedule+0x8d7/0x21d0 [ 389.595650] bpf_prog_e2ed69a7d397132f+0x759/0x1000 [ 389.600672] ? __sched_text_start+0x8/0x8 [ 389.604822] ? lock_downgrade+0x900/0x900 [ 389.608992] ? find_held_lock+0x36/0x1c0 [ 389.613072] ? lock_acquire+0x1ed/0x520 [ 389.617055] ? bpf_test_run+0x3cb/0x780 [ 389.621047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 389.626595] ? check_preemption_disabled+0x48/0x280 [ 389.631622] ? kasan_check_read+0x11/0x20 [ 389.635772] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 389.641056] ? rcu_softirq_qs+0x20/0x20 [ 389.645045] ? preempt_schedule+0x4d/0x60 [ 389.649202] ? ___preempt_schedule+0x16/0x18 [ 389.653627] ? bpf_test_run+0x25d/0x780 [ 389.657615] ? netlink_diag_dump+0x2a0/0x2a0 [ 389.662041] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 389.667583] ? bpf_test_init.isra.10+0x70/0x100 [ 389.672258] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 389.677024] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 389.681878] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 389.687418] ? fput+0x130/0x1a0 [ 389.690702] ? __bpf_prog_get+0x9b/0x290 [ 389.694772] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 389.699619] ? bpf_prog_test_run+0x130/0x1a0 [ 389.704044] ? __x64_sys_bpf+0x3d8/0x520 [ 389.708112] ? bpf_prog_get+0x20/0x20 [ 389.711939] ? do_syscall_64+0x1b9/0x820 [ 389.716007] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 389.721387] ? syscall_return_slowpath+0x5e0/0x5e0 [ 389.726326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.731175] ? trace_hardirqs_on_caller+0x310/0x310 [ 389.736197] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 389.741217] ? prepare_exit_to_usermode+0x291/0x3b0 [ 389.746241] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.751097] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:27 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000500000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:27 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00006000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:27 executing program 5: r0 = socket$kcm(0x2, 0x0, 0x84) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)}, 0x8000) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)=0x1) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000140)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx2\x00'}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000280)=[{0xe8, 0x10a, 0x9, "fb57fd7d8cbcc9fd3115ae1023719dbae41479e7663a54e8b1ad67b4ea138e0d875b01a8971982f453f3fa13084451fa624af0087806616544b9aff44236378920506ee2cd45aea803cd0424ef07b5c30bbbbb978dcedffd090213b8787bbdce758d5895bf6292f1d0dda76b889a4539f215d9992e9c9e1d5e6387c3cbaf7aaf2b9d8a79b83a77778fb51022e454c94a20bface2806682e9dd597a2e67d2b595c17b2bcd200bdef636716cd88c7ac939fc430c2d282d37ebbd04aff44ed7ef5e8bf2c7f2257b86723f8d0ebef4ca50a078c62541"}, {0x98, 0x104, 0x5, "d395cf58cb344bef88030f6371730d3a8d2d784f36796b4d78e75ce7bd40d9340cc79ab4ec5834cc29bd118c77561a8aea80e47616be7c53b5a45d6a7291f1d6dcbc0c3bc3f3df218bdb9794228428c68bfccca543d355af89f9fe99c09f0f51f80318f3e35417163c0e437ff944a65ead7ef7c689b732088dfc84c43798cdfe9f8e377e53cf5bf6"}, {0x98, 0x1ff, 0x7f, "b3aa1934ae09625416026710b06e83fec98dad07c6a32a9d0225b69fa8a9400550328797b89fbd6e2613072741dd14dbc5524175fea11d57e7e4eacb19252193defcc162862ec1ea1a58a99270b46e3dc7ab61c54a276f0d9f6d0e6f6fc886b3ba75cccdbf0e14a2bf59020eddc2a9a357124b1bbc54db154abaa219485b375464e61bc9cde4e64b"}, {0x30, 0x0, 0x40, "59ff76b28736853293793b827e3d4e5cbf97012f24d5913fb2ddc9267e654f50"}, {0x100, 0x107, 0xebd, "78ab0baff4ebc52d7b17e7ab06c27ed2063ba2a28705f0fa51928e6161be7040cca303daf804ee6e8682794ec30743efd18b2d9a7247bb3e9b5a734bf73a35954a1b6ad4064042c26f47cf46cdae24a1369e6d28a91d6b9867fcc95aa177fc042af3f1c176976dd439afd6f0178b0e4bfedb8b64bcc3ac76dbd713e2fc74a1aaa44f4b78125a95d2a5b2605871bbe0f571ed91402e994a845f929ca7494e9cda66c8c029d2eb3bbc1a1d390cf9423fee32ed5c83cf30f9f689a322cd89a4290adafc2974378343e8004f63957328575f43dd523b39bc72c5706426b3a5ab9f13ea55dd5dae6b015e25e4bd"}, {0xd0, 0x10f, 0x6, "24ee2532b879020abe19798e4ccd1bd339d7b4ed8ead29576dfcef870e7c230125535bf4661d25710ff7b962225fe3613afdc2eb467ab9958a99fedd2f7b30128fd8ef6af9900d3f5af9932ef5a02c641d97faa895363fd75bc071e2af8c592f06cebe3bed1219225ead9b34382dc7b86e639c80f0adaeb88e39136d72eb061cf61b52307560a84a949c48839fc2fc89c24c04125566b2576bd463cbefd7d0c13bcf1a8f7e66e4fa6f8b0fa69b9ba282af4ceb6f420b2b48172a876e8f6354"}], 0x418, 0x10}, 0x40) 12:06:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)="6367726f75702e737562747265655f636f6e74726f6cff", 0x2, 0x0) 12:06:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0xfffffffffffffffc) 12:06:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:28 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00008001a00000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:28 executing program 4: socket$kcm(0x2c, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffff9c, 0x0, 0xd, &(0x7f0000000240)='vboxnet0ppp0\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) sendmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1, &(0x7f0000000900)}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfffffdd1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x8d000000, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000540), 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000600)="2f67726f7574002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac752a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1c0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98ace3574511e0c61f722ff61f1db073657764c13f23ed76e9f5ad9b0a121d3019202a82a3e997831b6e1e10f53b98ab1eb37dc61e5717d51a0369715e1e92e66a6b80c82805f9df4f8a02c23d874f64ae00", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f0000000140)}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000740)={r3}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r3, &(0x7f00000004c0)="61723129b7b8f76b7bb1541b9c4e396f408d39f2615f7384286d1941a3da2c52cb5d8ebf057ec68212efb78897d2b18bbef7aeda04bd97f4fab6c768b3b6787cc1fe934d28f6c7c57931808a11369ee4ee415575e4ac259a3f0d29e02886858d311b0240d14fa6", &(0x7f00000002c0)=""/144}, 0x18) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)=0x6400000000000000) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="2e2f6367726f75702e6e65742f73797a3002", 0x1ff) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000000c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x28, &(0x7f0000000080)}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0), 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYRESHEX=r0], 0x12) write$cgroup_int(r4, &(0x7f00000001c0), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000005c0)={r4, 0x10, &(0x7f0000000580)={&(0x7f0000000440)=""/89, 0x59, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000007c0)={r3, 0x10, &(0x7f0000000780)={&(0x7f0000000840)=""/179, 0xb3, r6}}, 0x10) write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="6a18a82c15390104a75402a0cec9cc79886d491a37"], 0x15) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x9, 0xc8f9, 0xffff, 0x20, r5}, 0x2c) 12:06:28 executing program 2 (fault-call:3 fault-nth:10): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 390.165566] protocol 0004 is buggy, dev gre0 [ 390.166323] protocol 0004 is buggy, dev gre0 [ 390.173363] protocol 0004 is buggy, dev gre0 [ 390.174669] FAULT_INJECTION: forcing a failure. [ 390.174669] name failslab, interval 1, probability 0, space 0, times 0 [ 390.190342] CPU: 0 PID: 23285 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 390.197619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.206971] Call Trace: [ 390.209575] dump_stack+0x244/0x39d [ 390.213212] ? dump_stack_print_info.cold.1+0x20/0x20 [ 390.218410] ? mark_held_locks+0x130/0x130 [ 390.222647] ? kasan_check_read+0x11/0x20 [ 390.226806] should_fail.cold.4+0xa/0x17 [ 390.230880] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 390.235986] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 390.241092] ? depot_save_stack+0x292/0x470 [ 390.245420] ? save_stack+0xa9/0xd0 [ 390.249057] ? save_stack+0x43/0xd0 [ 390.252683] ? kasan_kmalloc+0xc7/0xe0 [ 390.256569] ? kasan_slab_alloc+0x12/0x20 [ 390.260714] ? kmem_cache_alloc+0x12e/0x730 [ 390.265047] ? __nf_conntrack_alloc+0x1aa/0x7c0 [ 390.269720] ? init_conntrack.isra.47+0xff6/0x13c0 [ 390.274649] ? nf_conntrack_in+0xc7d/0x13b0 [ 390.278974] ? ipv4_conntrack_local+0x16a/0x220 [ 390.283644] ? nf_hook_slow+0xc2/0x1c0 [ 390.287532] ? __ip_local_out+0x56e/0xb30 [ 390.291680] ? ip_local_out+0x2d/0x1b0 [ 390.295651] ? iptunnel_xmit+0x56a/0x8d0 [ 390.299712] ? ip_tunnel_xmit+0x15b8/0x3c04 [ 390.304041] ? __gre_xmit+0x5e1/0x980 [ 390.307840] ? ipgre_xmit+0x3e7/0xba0 [ 390.311641] ? dev_hard_start_xmit+0x295/0xc80 [ 390.316227] ? zap_class+0x640/0x640 [ 390.319938] ? bpf_clone_redirect+0x2f6/0x490 [ 390.324436] ? bpf_prog_e2ed69a7d397132f+0x544/0x1000 [ 390.329638] ? zap_class+0x640/0x640 [ 390.333356] ? find_held_lock+0x36/0x1c0 [ 390.337439] __should_failslab+0x124/0x180 [ 390.341682] should_failslab+0x9/0x14 [ 390.345483] __kmalloc_track_caller+0x6c/0x760 [ 390.350069] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 390.355349] ? rcu_softirq_qs+0x20/0x20 [ 390.359332] ? nf_ct_ext_add+0x369/0x7b0 [ 390.363397] __krealloc+0x6f/0xb0 [ 390.366854] nf_ct_ext_add+0x369/0x7b0 [ 390.370748] ? nf_ct_ext_destroy+0x370/0x370 [ 390.375158] ? __local_bh_enable_ip+0x160/0x260 [ 390.379830] ? __local_bh_enable_ip+0x160/0x260 [ 390.384593] ? lockdep_hardirqs_on+0x296/0x5b0 [ 390.389189] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 390.394395] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 390.399944] init_conntrack.isra.47+0x730/0x13c0 [ 390.404706] ? __lock_acquire+0x62f/0x4c20 [ 390.408955] ? nf_conntrack_alloc+0x50/0x50 [ 390.413309] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 390.418531] ? lock_acquire+0x1ed/0x520 [ 390.422515] ? nf_conntrack_in+0x5de/0x13b0 [ 390.426846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.432397] ? check_preemption_disabled+0x48/0x280 [ 390.437426] ? kasan_check_read+0x11/0x20 [ 390.441577] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 390.446870] ? trace_hardirqs_off_caller+0x310/0x310 [ 390.451994] nf_conntrack_in+0xc7d/0x13b0 [ 390.456171] ? nf_conntrack_update+0xbc0/0xbc0 [ 390.460786] ? __do_replace+0xab0/0xab0 [ 390.464763] ? zap_class+0x640/0x640 [ 390.468488] ? lock_acquire+0x130/0x520 [ 390.472491] ? nf_ct_l4proto_unregister_sysctl.isra.16+0x130/0x130 [ 390.478822] ipv4_conntrack_local+0x16a/0x220 [ 390.483333] nf_hook_slow+0xc2/0x1c0 [ 390.487067] __ip_local_out+0x56e/0xb30 [ 390.491058] ? ip_finish_output+0xfa0/0xfa0 [ 390.495392] ? __ip_flush_pending_frames.isra.44+0x2d0/0x2d0 [ 390.501213] ? __ip_select_ident+0x16d/0x2a0 [ 390.505626] ? ip_idents_reserve+0x320/0x320 [ 390.510057] ip_local_out+0x2d/0x1b0 [ 390.513784] iptunnel_xmit+0x56a/0x8d0 [ 390.517684] ip_tunnel_xmit+0x15b8/0x3c04 [ 390.521850] ? ip_tunnel_init_net+0xac0/0xac0 [ 390.526349] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 390.531205] ? kasan_check_write+0x14/0x20 [ 390.535447] ? pskb_expand_head+0x6b3/0x10f0 [ 390.539882] ? skb_release_data+0x880/0x880 [ 390.544220] ? dev_queue_xmit_nit+0x940/0xc90 [ 390.548732] ? check_preemption_disabled+0x48/0x280 [ 390.553764] ? kasan_check_read+0x11/0x20 [ 390.557917] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 390.563199] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 390.568747] __gre_xmit+0x5e1/0x980 [ 390.572387] ipgre_xmit+0x3e7/0xba0 [ 390.576020] ? gre_tap_xmit+0x590/0x590 [ 390.580007] ? __lock_is_held+0xb5/0x140 [ 390.584092] dev_hard_start_xmit+0x295/0xc80 [ 390.588531] ? dev_direct_xmit+0x6b0/0x6b0 [ 390.592776] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 390.598326] ? netif_skb_features+0x690/0xb70 [ 390.602831] ? validate_xmit_xfrm+0x1ef/0xda0 [ 390.607346] ? validate_xmit_skb+0x80c/0xf30 [ 390.611785] ? netif_skb_features+0xb70/0xb70 [ 390.616289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.621842] ? check_preemption_disabled+0x48/0x280 [ 390.626864] ? check_preemption_disabled+0x48/0x280 [ 390.631890] __dev_queue_xmit+0x2f71/0x3ad0 [ 390.636221] ? save_stack+0x43/0xd0 [ 390.639848] ? kasan_kmalloc+0xc7/0xe0 [ 390.643734] ? __kmalloc_node_track_caller+0x50/0x70 [ 390.648856] ? netdev_pick_tx+0x310/0x310 [ 390.653007] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 390.658119] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 390.663232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.668778] ? check_preemption_disabled+0x48/0x280 [ 390.673811] ? __lock_is_held+0xb5/0x140 [ 390.677888] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 390.682916] ? skb_release_data+0x1c4/0x880 [ 390.687248] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 390.692532] ? kasan_unpoison_shadow+0x35/0x50 [ 390.697120] ? skb_tx_error+0x2f0/0x2f0 [ 390.701111] ? __kmalloc_node_track_caller+0x50/0x70 [ 390.706239] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.711780] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 390.717577] ? kasan_check_write+0x14/0x20 [ 390.721815] ? pskb_expand_head+0x6b3/0x10f0 [ 390.726243] ? skb_release_data+0x880/0x880 [ 390.730572] ? __alloc_skb+0x770/0x770 [ 390.734548] ? __lock_is_held+0xb5/0x140 [ 390.738623] ? kasan_check_write+0x14/0x20 [ 390.742860] ? __skb_clone+0x6c7/0xa00 [ 390.746841] ? __copy_skb_header+0x6b0/0x6b0 [ 390.751257] ? kmem_cache_alloc+0x33a/0x730 [ 390.755594] ? skb_ensure_writable+0x15e/0x640 [ 390.760188] dev_queue_xmit+0x17/0x20 [ 390.763990] ? dev_queue_xmit+0x17/0x20 [ 390.767964] __bpf_redirect+0x5cf/0xb20 [ 390.771952] bpf_clone_redirect+0x2f6/0x490 [ 390.776289] bpf_prog_e2ed69a7d397132f+0x544/0x1000 [ 390.781338] ? bpf_test_run+0x175/0x780 [ 390.785329] ? lock_downgrade+0x900/0x900 [ 390.789486] ? ktime_get+0x332/0x400 [ 390.793217] ? pvclock_read_flags+0x160/0x160 [ 390.797717] ? bpf_test_run+0x175/0x780 [ 390.801701] ? trace_hardirqs_off_caller+0x310/0x310 [ 390.806819] ? lock_acquire+0x1ed/0x520 [ 390.810800] ? bpf_test_run+0x3cb/0x780 [ 390.814780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 390.820330] ? check_preemption_disabled+0x48/0x280 [ 390.825355] ? kasan_check_read+0x11/0x20 [ 390.829506] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 390.834783] ? rcu_softirq_qs+0x20/0x20 [ 390.838760] ? bpf_cgroup_storage_release+0x220/0x220 [ 390.843962] ? skb_try_coalesce+0x1b70/0x1b70 [ 390.848472] ? bpf_test_run+0x25d/0x780 [ 390.852461] ? netlink_diag_dump+0x2a0/0x2a0 [ 390.856878] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 390.862417] ? bpf_test_init.isra.10+0x70/0x100 [ 390.867095] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 390.871871] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 390.876715] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 390.882261] ? fput+0x130/0x1a0 [ 390.885546] ? __bpf_prog_get+0x9b/0x290 [ 390.889615] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 390.894455] ? bpf_prog_test_run+0x130/0x1a0 [ 390.898869] ? __x64_sys_bpf+0x3d8/0x520 [ 390.902932] ? bpf_prog_get+0x20/0x20 [ 390.906758] ? do_syscall_64+0x1b9/0x820 [ 390.910872] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 12:06:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 390.916242] ? syscall_return_slowpath+0x5e0/0x5e0 [ 390.921172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.926018] ? trace_hardirqs_on_caller+0x310/0x310 [ 390.931053] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 390.936077] ? prepare_exit_to_usermode+0x291/0x3b0 [ 390.941105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.945958] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00090000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)="6367726f75702e737562747265655f636f6e74726f6ca0", 0x2, 0x0) 12:06:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) 12:06:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000a0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x3}, 0x2c) 12:06:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)="6367726f75702e737562747265655f636f6e74726f6ca0", 0x2, 0x0) 12:06:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0xffffffffa0008000) 12:06:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000300000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 391.912779] audit: type=1804 audit(1542110789.870:186): pid=23281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor4" name="/root/syzkaller-testdir242659255/syzkaller.9ltwFm/625/memory.events" dev="sda1" ino=16560 res=1 [ 391.937832] audit: type=1804 audit(1542110789.880:188): pid=23311 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor4" name="/root/syzkaller-testdir242659255/syzkaller.9ltwFm/625/memory.events" dev="sda1" ino=16560 res=1 12:06:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) gettid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x81, 0xd22, 0x6, 0x8, r0, 0x28b}, 0x2c) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) 12:06:29 executing program 2 (fault-call:3 fault-nth:11): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x300000000000000) 12:06:29 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00a00180000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x92, 0x51, &(0x7f0000000380)="91ccbe21fa749ff8188086309986a9e6f3ee61aedf0ff081a46639e767eadf6c8ab60f6283b49663f9ad0daba23957f0b493a9a77e5f379a09833f420420d201e3990b85b2d953b82c2ec6f8ef853802ec99ce38465c93c2a468e6e2272e3dfc98b0122250f64e0d578b311719aac78b17df14beed930616f22722eaea4b11520633d14a8bb8b0305289a23383574ab2c7e7", &(0x7f0000000440)=""/81, 0x5}, 0x28) 12:06:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x3}, 0x2c) [ 391.962069] audit: type=1800 audit(1542110789.870:187): pid=23281 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor4" name="memory.events" dev="sda1" ino=16560 res=0 [ 392.043516] FAULT_INJECTION: forcing a failure. [ 392.043516] name failslab, interval 1, probability 0, space 0, times 0 [ 392.054897] CPU: 1 PID: 23348 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 392.062186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.071547] Call Trace: [ 392.074152] dump_stack+0x244/0x39d [ 392.077792] ? dump_stack_print_info.cold.1+0x20/0x20 [ 392.082997] ? nf_hook_slow+0x11e/0x1c0 [ 392.086994] should_fail.cold.4+0xa/0x17 [ 392.091074] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 392.096181] ? lock_downgrade+0x900/0x900 [ 392.100341] ? rb_next+0x140/0x140 [ 392.103888] ? kasan_check_read+0x11/0x20 [ 392.108049] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 392.113328] ? rcu_softirq_qs+0x20/0x20 [ 392.117312] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 392.122331] ? nf_hook_slow+0x11e/0x1c0 [ 392.126316] ? ip_fragment.constprop.50+0x240/0x240 [ 392.131339] ? __ip_local_out+0x5e2/0xb30 [ 392.135494] ? ip_finish_output+0xfa0/0xfa0 [ 392.139836] ? print_usage_bug+0xc0/0xc0 [ 392.143905] ? __ip_select_ident+0x16d/0x2a0 [ 392.148320] ? ip_idents_reserve+0x320/0x320 [ 392.152735] ? print_usage_bug+0xc0/0xc0 [ 392.156822] __should_failslab+0x124/0x180 [ 392.161078] should_failslab+0x9/0x14 [ 392.164881] kmem_cache_alloc_node_trace+0x5a/0x740 [ 392.169903] ? ip_tunnel_xmit+0x15b8/0x3c04 [ 392.174240] __kmalloc_node_track_caller+0x3c/0x70 [ 392.179184] __kmalloc_reserve.isra.40+0x41/0xe0 [ 392.183953] pskb_expand_head+0x230/0x10f0 [ 392.188194] ? mark_held_locks+0x130/0x130 [ 392.192433] ? mark_held_locks+0x130/0x130 [ 392.196685] ? skb_release_data+0x880/0x880 [ 392.201015] ? __update_load_avg_se+0xae0/0xae0 [ 392.205698] ? __lock_is_held+0xb5/0x140 [ 392.209758] ? zap_class+0x640/0x640 [ 392.213488] ? mark_held_locks+0x130/0x130 [ 392.217726] ? zap_class+0x640/0x640 [ 392.221440] ? __lock_acquire+0x62f/0x4c20 [ 392.225678] ? attach_entity_load_avg+0x860/0x860 [ 392.230524] ? zap_class+0x640/0x640 [ 392.234239] ? zap_class+0x640/0x640 [ 392.237959] ipgre_xmit+0x679/0xba0 [ 392.241597] ? gre_tap_xmit+0x590/0x590 [ 392.245579] ? __lock_is_held+0xb5/0x140 [ 392.249654] dev_hard_start_xmit+0x295/0xc80 [ 392.254070] ? dev_direct_xmit+0x6b0/0x6b0 [ 392.258316] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 392.263855] ? netif_skb_features+0x690/0xb70 [ 392.268352] ? rcu_softirq_qs+0x20/0x20 [ 392.272334] ? validate_xmit_xfrm+0x1ef/0xda0 [ 392.276842] ? validate_xmit_skb+0x80c/0xf30 [ 392.281262] ? netif_skb_features+0xb70/0xb70 [ 392.285761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.291303] ? check_preemption_disabled+0x48/0x280 [ 392.296319] ? check_preemption_disabled+0x48/0x280 [ 392.301341] __dev_queue_xmit+0x2f71/0x3ad0 [ 392.305668] ? save_stack+0x43/0xd0 [ 392.309295] ? kasan_kmalloc+0xc7/0xe0 [ 392.313183] ? __kmalloc_node_track_caller+0x50/0x70 [ 392.318294] ? netdev_pick_tx+0x310/0x310 [ 392.322449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.327989] ? check_preemption_disabled+0x48/0x280 [ 392.333021] ? __lock_is_held+0xb5/0x140 [ 392.337101] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 392.342121] ? skb_release_data+0x1c4/0x880 [ 392.346448] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 392.351731] ? kasan_unpoison_shadow+0x35/0x50 [ 392.356314] ? skb_tx_error+0x2f0/0x2f0 [ 392.360302] ? __kmalloc_node_track_caller+0x50/0x70 [ 392.365414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.370958] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 392.376506] ? kasan_check_write+0x14/0x20 [ 392.380779] ? pskb_expand_head+0x6b3/0x10f0 [ 392.385222] ? skb_release_data+0x880/0x880 [ 392.389545] ? __alloc_skb+0x770/0x770 [ 392.393445] ? __lock_is_held+0xb5/0x140 [ 392.397520] ? kasan_check_write+0x14/0x20 [ 392.401760] ? __skb_clone+0x6c7/0xa00 [ 392.405655] ? __copy_skb_header+0x6b0/0x6b0 [ 392.410071] ? kmem_cache_alloc+0x33a/0x730 [ 392.414410] ? skb_ensure_writable+0x15e/0x640 [ 392.419003] dev_queue_xmit+0x17/0x20 [ 392.422846] ? dev_queue_xmit+0x17/0x20 [ 392.426824] __bpf_redirect+0x5cf/0xb20 [ 392.430822] bpf_clone_redirect+0x2f6/0x490 [ 392.435161] bpf_prog_e2ed69a7d397132f+0xfc0/0x1000 [ 392.440184] ? __sched_text_start+0x8/0x8 [ 392.444337] ? lock_downgrade+0x900/0x900 [ 392.448500] ? find_held_lock+0x36/0x1c0 [ 392.452570] ? lock_acquire+0x1ed/0x520 [ 392.456544] ? bpf_test_run+0x3cb/0x780 [ 392.460544] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.466089] ? check_preemption_disabled+0x48/0x280 [ 392.471115] ? kasan_check_read+0x11/0x20 [ 392.475262] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 392.480539] ? rcu_softirq_qs+0x20/0x20 [ 392.484522] ? preempt_schedule+0x4d/0x60 [ 392.488682] ? ___preempt_schedule+0x16/0x18 [ 392.493113] ? bpf_test_run+0x25d/0x780 [ 392.497106] ? netlink_diag_dump+0x2a0/0x2a0 [ 392.501529] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 392.507095] ? bpf_test_init.isra.10+0x70/0x100 [ 392.511786] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 392.516567] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 392.521426] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 392.526990] ? fput+0x130/0x1a0 [ 392.530291] ? __bpf_prog_get+0x9b/0x290 [ 392.534366] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 392.539210] ? bpf_prog_test_run+0x130/0x1a0 [ 392.543625] ? __x64_sys_bpf+0x3d8/0x520 [ 392.547689] ? bpf_prog_get+0x20/0x20 [ 392.551521] ? do_syscall_64+0x1b9/0x820 [ 392.555582] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 392.560951] ? syscall_return_slowpath+0x5e0/0x5e0 [ 392.565881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 392.570731] ? trace_hardirqs_on_caller+0x310/0x310 [ 392.575749] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 392.580768] ? prepare_exit_to_usermode+0x291/0x3b0 [ 392.585819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 392.590682] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:30 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x1000000000000) 12:06:30 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00300000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:30 executing program 2 (fault-call:3 fault-nth:12): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:30 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x4000000) [ 392.807175] FAULT_INJECTION: forcing a failure. [ 392.807175] name failslab, interval 1, probability 0, space 0, times 0 [ 392.818521] CPU: 1 PID: 23370 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 392.825822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.835194] Call Trace: [ 392.837818] dump_stack+0x244/0x39d [ 392.841474] ? dump_stack_print_info.cold.1+0x20/0x20 [ 392.846689] ? __lock_acquire+0x62f/0x4c20 [ 392.850943] ? kasan_check_read+0x11/0x20 [ 392.855115] should_fail.cold.4+0xa/0x17 [ 392.859192] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 392.864312] ? __lock_acquire+0x62f/0x4c20 [ 392.868562] ? find_held_lock+0x36/0x1c0 [ 392.872643] ? mark_held_locks+0x130/0x130 [ 392.876904] ? zap_class+0x640/0x640 [ 392.880626] ? print_usage_bug+0xc0/0xc0 [ 392.884695] ? trace_hardirqs_off_caller+0x310/0x310 [ 392.889812] ? zap_class+0x640/0x640 [ 392.893552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.899102] ? check_preemption_disabled+0x48/0x280 [ 392.904159] ? __lock_is_held+0xb5/0x140 [ 392.908240] __should_failslab+0x124/0x180 [ 392.912488] should_failslab+0x9/0x14 [ 392.916294] kmem_cache_alloc+0x47/0x730 [ 392.920368] ? ip_mc_drop_socket+0x270/0x270 [ 392.924785] dst_alloc+0xbb/0x1d0 [ 392.928252] rt_dst_alloc+0x105/0x540 [ 392.932069] ? fnhe_flush_routes+0x480/0x480 [ 392.936489] ? __lock_is_held+0xb5/0x140 [ 392.940569] ip_route_output_key_hash_rcu+0xa57/0x3490 [ 392.945852] ? rcu_softirq_qs+0x20/0x20 [ 392.949843] ? ip_route_input_noref+0x260/0x260 [ 392.954520] ? kernel_text_address+0x79/0xf0 [ 392.958936] ? __kernel_text_address+0xd/0x40 [ 392.963436] ? unwind_get_return_address+0x61/0xa0 [ 392.968373] ? __save_stack_trace+0x8d/0xf0 [ 392.972711] ? lock_acquire+0x1ed/0x520 [ 392.976693] ? ip_route_output_key_hash+0x1ab/0x3b0 [ 392.981716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.987263] ? check_preemption_disabled+0x48/0x280 [ 392.992296] ? kasan_check_read+0x11/0x20 [ 392.996447] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 393.001733] ? pskb_expand_head+0x3bb/0x10f0 [ 393.006149] ? rcu_softirq_qs+0x20/0x20 [ 393.010132] ? lockdep_hardirqs_on+0x296/0x5b0 [ 393.014743] ip_route_output_key_hash+0x240/0x3b0 [ 393.019596] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 393.025148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 393.029916] ip_route_output_flow+0x28/0xc0 [ 393.034247] ip_tunnel_xmit+0x19a8/0x3c04 [ 393.038410] ? ip_tunnel_init_net+0xac0/0xac0 [ 393.042912] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 393.047763] ? kasan_check_write+0x14/0x20 [ 393.052002] ? pskb_expand_head+0x6b3/0x10f0 [ 393.056420] ? mark_held_locks+0x130/0x130 [ 393.060662] ? mark_held_locks+0x130/0x130 [ 393.064910] ? skb_release_data+0x880/0x880 [ 393.069242] ? mark_held_locks+0x130/0x130 [ 393.073478] ? print_usage_bug+0xc0/0xc0 [ 393.077547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.083114] ? mark_held_locks+0x130/0x130 [ 393.087362] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 393.092910] __gre_xmit+0x5e1/0x980 [ 393.096556] ipgre_xmit+0x3e7/0xba0 [ 393.100195] ? gre_tap_xmit+0x590/0x590 [ 393.104177] ? __lock_is_held+0xb5/0x140 [ 393.108260] dev_hard_start_xmit+0x295/0xc80 [ 393.112683] ? dev_direct_xmit+0x6b0/0x6b0 [ 393.116930] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 393.122476] ? netif_skb_features+0x690/0xb70 [ 393.126975] ? rcu_softirq_qs+0x20/0x20 [ 393.130964] ? validate_xmit_xfrm+0x1ef/0xda0 [ 393.135480] ? validate_xmit_skb+0x80c/0xf30 [ 393.139905] ? netif_skb_features+0xb70/0xb70 [ 393.144409] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.149959] ? check_preemption_disabled+0x48/0x280 [ 393.154981] ? check_preemption_disabled+0x48/0x280 [ 393.160009] __dev_queue_xmit+0x2f71/0x3ad0 [ 393.164345] ? save_stack+0x43/0xd0 [ 393.167975] ? kasan_kmalloc+0xc7/0xe0 [ 393.171871] ? __kmalloc_node_track_caller+0x50/0x70 [ 393.176989] ? netdev_pick_tx+0x310/0x310 [ 393.181151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.186697] ? check_preemption_disabled+0x48/0x280 [ 393.191731] ? __lock_is_held+0xb5/0x140 [ 393.195814] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 393.200838] ? skb_release_data+0x1c4/0x880 [ 393.205203] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 393.210489] ? kasan_unpoison_shadow+0x35/0x50 [ 393.215076] ? skb_tx_error+0x2f0/0x2f0 [ 393.219067] ? __kmalloc_node_track_caller+0x50/0x70 [ 393.224178] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 393.229723] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 393.235267] ? kasan_check_write+0x14/0x20 [ 393.239507] ? pskb_expand_head+0x6b3/0x10f0 [ 393.243930] ? skb_release_data+0x880/0x880 [ 393.248255] ? __alloc_skb+0x770/0x770 [ 393.252162] ? __lock_is_held+0xb5/0x140 [ 393.256235] ? kasan_check_write+0x14/0x20 [ 393.260471] ? __skb_clone+0x6c7/0xa00 [ 393.264363] ? __copy_skb_header+0x6b0/0x6b0 [ 393.268771] ? kmem_cache_alloc+0x33a/0x730 [ 393.273113] ? skb_ensure_writable+0x15e/0x640 [ 393.277710] dev_queue_xmit+0x17/0x20 [ 393.281511] ? dev_queue_xmit+0x17/0x20 [ 393.285485] __bpf_redirect+0x5cf/0xb20 [ 393.289469] bpf_clone_redirect+0x2f6/0x490 [ 393.293810] bpf_prog_e2ed69a7d397132f+0x3cf/0x1000 [ 393.298832] ? bpf_test_run+0x175/0x780 [ 393.302819] ? lock_downgrade+0x900/0x900 [ 393.306971] ? ktime_get+0x332/0x400 [ 393.310709] ? find_held_lock+0x36/0x1c0 [ 393.314792] ? lock_acquire+0x1ed/0x520 [ 393.318782] ? bpf_test_run+0x3cb/0x780 [ 393.322772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.328323] ? check_preemption_disabled+0x48/0x280 [ 393.333356] ? kasan_check_read+0x11/0x20 [ 393.337506] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 393.342787] ? rcu_softirq_qs+0x20/0x20 [ 393.346767] ? bpf_cgroup_storage_release+0x220/0x220 [ 393.351972] ? skb_try_coalesce+0x1b70/0x1b70 [ 393.356484] ? bpf_test_run+0x25d/0x780 [ 393.360478] ? netlink_diag_dump+0x2a0/0x2a0 [ 393.364897] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 393.370450] ? bpf_test_init.isra.10+0x70/0x100 [ 393.375136] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 393.379908] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 393.384762] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 393.390310] ? fput+0x130/0x1a0 [ 393.393598] ? __bpf_prog_get+0x9b/0x290 [ 393.397673] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 393.402525] ? bpf_prog_test_run+0x130/0x1a0 12:06:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x8001a0) [ 393.406948] ? __x64_sys_bpf+0x3d8/0x520 [ 393.411017] ? bpf_prog_get+0x20/0x20 [ 393.414857] ? do_syscall_64+0x1b9/0x820 [ 393.418921] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 393.424293] ? syscall_return_slowpath+0x5e0/0x5e0 [ 393.429225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 393.434083] ? trace_hardirqs_on_caller+0x310/0x310 [ 393.439107] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 393.444138] ? prepare_exit_to_usermode+0x291/0x3b0 [ 393.449167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 393.454026] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0xffffffffa0018000) 12:06:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x294a601449217f64, 0x2d90, 0x20, 0x8001, 0x2, r0, 0x7}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) 12:06:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x92, 0x51, &(0x7f0000000380)="91ccbe21fa749ff8188086309986a9e6f3ee61aedf0ff081a46639e767eadf6c8ab60f6283b49663f9ad0daba23957f0b493a9a77e5f379a09833f420420d201e3990b85b2d953b82c2ec6f8ef853802ec99ce38465c93c2a468e6e2272e3dfc98b0122250f64e0d578b311719aac78b17df14beed930616f22722eaea4b11520633d14a8bb8b0305289a23383574ab2c7e7", &(0x7f0000000440)=""/81, 0x5}, 0x28) 12:06:31 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000e0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x8000a0ffffffff) 12:06:31 executing program 2 (fault-call:3 fault-nth:13): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 393.741309] FAULT_INJECTION: forcing a failure. [ 393.741309] name failslab, interval 1, probability 0, space 0, times 0 [ 393.752652] CPU: 0 PID: 23391 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 393.759937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.769294] Call Trace: [ 393.771913] dump_stack+0x244/0x39d [ 393.775567] ? dump_stack_print_info.cold.1+0x20/0x20 [ 393.780799] should_fail.cold.4+0xa/0x17 [ 393.784876] ? __lock_acquire+0x62f/0x4c20 [ 393.789130] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 393.794265] ? zap_class+0x640/0x640 [ 393.798007] ? is_bpf_text_address+0xac/0x170 [ 393.802526] ? lock_downgrade+0x900/0x900 [ 393.806695] ? check_preemption_disabled+0x48/0x280 [ 393.811738] ? find_held_lock+0x36/0x1c0 [ 393.815823] ? __nf_conntrack_find_get.part.44+0x10de/0x1cf0 [ 393.821639] ? lock_downgrade+0x900/0x900 [ 393.825801] ? check_preemption_disabled+0x48/0x280 [ 393.830836] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 393.835778] ? kasan_check_read+0x11/0x20 [ 393.839941] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 393.845235] __should_failslab+0x124/0x180 [ 393.849490] should_failslab+0x9/0x14 [ 393.853311] kmem_cache_alloc+0x47/0x730 [ 393.857389] ? __nf_conntrack_find_get.part.44+0x1105/0x1cf0 [ 393.863195] __nf_conntrack_alloc+0x1aa/0x7c0 [ 393.867701] ? early_drop+0xc40/0xc40 [ 393.871503] ? __local_bh_enable_ip+0x160/0x260 [ 393.876171] ? __local_bh_enable_ip+0x160/0x260 [ 393.880845] ? lockdep_hardirqs_on+0x296/0x5b0 [ 393.885431] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 393.890624] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 393.896167] init_conntrack.isra.47+0xff6/0x13c0 [ 393.900927] ? __lock_acquire+0x62f/0x4c20 [ 393.905165] ? rt_add_uncached_list+0x1e1/0x280 [ 393.909841] ? nf_conntrack_alloc+0x50/0x50 [ 393.914171] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 393.919375] ? lock_acquire+0x1ed/0x520 [ 393.923350] ? nf_conntrack_in+0x5de/0x13b0 [ 393.927676] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 393.933222] ? check_preemption_disabled+0x48/0x280 [ 393.938249] ? kasan_check_read+0x11/0x20 [ 393.942399] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 393.947685] ? trace_hardirqs_off_caller+0x310/0x310 [ 393.952795] nf_conntrack_in+0xc7d/0x13b0 [ 393.956965] ? nf_conntrack_update+0xbc0/0xbc0 [ 393.961579] ? __do_replace+0xab0/0xab0 [ 393.965558] ? zap_class+0x640/0x640 [ 393.969281] ? lock_acquire+0x130/0x520 [ 393.973312] ? nf_ct_l4proto_unregister_sysctl.isra.16+0x130/0x130 [ 393.979634] ipv4_conntrack_local+0x16a/0x220 [ 393.984139] nf_hook_slow+0xc2/0x1c0 [ 393.987866] __ip_local_out+0x56e/0xb30 [ 393.991846] ? ip_finish_output+0xfa0/0xfa0 [ 393.996179] ? __ip_flush_pending_frames.isra.44+0x2d0/0x2d0 [ 394.002003] ? __ip_select_ident+0x16d/0x2a0 [ 394.006419] ? ip_idents_reserve+0x320/0x320 [ 394.010837] ip_local_out+0x2d/0x1b0 [ 394.014562] iptunnel_xmit+0x56a/0x8d0 [ 394.018461] ip_tunnel_xmit+0x15b8/0x3c04 [ 394.022627] ? ip_tunnel_init_net+0xac0/0xac0 [ 394.027129] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 394.031984] ? kasan_check_write+0x14/0x20 [ 394.036226] ? pskb_expand_head+0x6b3/0x10f0 [ 394.040638] ? mark_held_locks+0x130/0x130 [ 394.044877] ? mark_held_locks+0x130/0x130 [ 394.049124] ? skb_release_data+0x880/0x880 [ 394.053448] ? mark_held_locks+0x130/0x130 [ 394.057695] ? mark_held_locks+0x130/0x130 [ 394.061939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 394.067482] __gre_xmit+0x5e1/0x980 [ 394.071123] ipgre_xmit+0x3e7/0xba0 [ 394.074754] ? gre_tap_xmit+0x590/0x590 [ 394.078734] ? __lock_is_held+0xb5/0x140 [ 394.082808] dev_hard_start_xmit+0x295/0xc80 [ 394.087229] ? dev_direct_xmit+0x6b0/0x6b0 [ 394.091470] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 394.097008] ? netif_skb_features+0x690/0xb70 [ 394.101509] ? rcu_softirq_qs+0x20/0x20 [ 394.105488] ? validate_xmit_xfrm+0x1ef/0xda0 [ 394.109993] ? validate_xmit_skb+0x80c/0xf30 [ 394.114414] ? netif_skb_features+0xb70/0xb70 [ 394.118917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.124460] ? check_preemption_disabled+0x48/0x280 [ 394.129482] ? check_preemption_disabled+0x48/0x280 [ 394.134503] __dev_queue_xmit+0x2f71/0x3ad0 [ 394.138835] ? save_stack+0x43/0xd0 [ 394.142461] ? kasan_kmalloc+0xc7/0xe0 [ 394.146348] ? __kmalloc_node_track_caller+0x50/0x70 [ 394.151461] ? netdev_pick_tx+0x310/0x310 [ 394.155620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.161159] ? check_preemption_disabled+0x48/0x280 [ 394.166190] ? __lock_is_held+0xb5/0x140 [ 394.170265] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 394.175286] ? skb_release_data+0x1c4/0x880 [ 394.179619] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 394.184899] ? kasan_unpoison_shadow+0x35/0x50 [ 394.189482] ? skb_tx_error+0x2f0/0x2f0 [ 394.193461] ? __kmalloc_node_track_caller+0x50/0x70 [ 394.198567] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 394.204105] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 394.209647] ? kasan_check_write+0x14/0x20 [ 394.213883] ? pskb_expand_head+0x6b3/0x10f0 [ 394.218314] ? skb_release_data+0x880/0x880 [ 394.222643] ? __alloc_skb+0x770/0x770 [ 394.226546] ? __lock_is_held+0xb5/0x140 [ 394.230618] ? kasan_check_write+0x14/0x20 [ 394.234856] ? __skb_clone+0x6c7/0xa00 [ 394.238746] ? __copy_skb_header+0x6b0/0x6b0 [ 394.243157] ? kmem_cache_alloc+0x33a/0x730 [ 394.247490] ? skb_ensure_writable+0x15e/0x640 [ 394.252085] dev_queue_xmit+0x17/0x20 [ 394.255887] ? dev_queue_xmit+0x17/0x20 [ 394.259861] __bpf_redirect+0x5cf/0xb20 [ 394.263846] bpf_clone_redirect+0x2f6/0x490 [ 394.268181] bpf_prog_e2ed69a7d397132f+0x687/0x1000 [ 394.273199] ? bpf_test_run+0x175/0x780 [ 394.277182] ? lock_downgrade+0x900/0x900 [ 394.281333] ? ktime_get+0x332/0x400 [ 394.285069] ? find_held_lock+0x36/0x1c0 [ 394.289144] ? lock_acquire+0x1ed/0x520 [ 394.293124] ? bpf_test_run+0x3cb/0x780 [ 394.297104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.302648] ? check_preemption_disabled+0x48/0x280 [ 394.307676] ? kasan_check_read+0x11/0x20 [ 394.311826] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 394.317101] ? rcu_softirq_qs+0x20/0x20 [ 394.321078] ? bpf_cgroup_storage_release+0x220/0x220 [ 394.326276] ? skb_try_coalesce+0x1b70/0x1b70 [ 394.330785] ? bpf_test_run+0x25d/0x780 [ 394.334771] ? netlink_diag_dump+0x2a0/0x2a0 [ 394.339188] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 394.344727] ? bpf_test_init.isra.10+0x70/0x100 [ 394.349402] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 394.354172] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 394.359047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 394.364603] ? fput+0x130/0x1a0 [ 394.367884] ? __bpf_prog_get+0x9b/0x290 [ 394.371955] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 394.376794] ? bpf_prog_test_run+0x130/0x1a0 [ 394.381208] ? __x64_sys_bpf+0x3d8/0x520 [ 394.385270] ? bpf_prog_get+0x20/0x20 [ 394.389099] ? do_syscall_64+0x1b9/0x820 12:06:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x5, 0x1000000000000914, 0x4000000005, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x81, 0x4, 0x4, 0x0, r0}, 0x2c) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x6, 0x9, 0x8001, 0x5, 0x2, r1, 0x6}, 0x2c) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000140)=r3) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x7, 0x5, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r1}]}, &(0x7f0000000180)='GPL\x00', 0x80000001, 0x1000, &(0x7f0000000400)=""/4096}, 0x48) 12:06:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0xa0008000) [ 394.393164] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 394.398533] ? syscall_return_slowpath+0x5e0/0x5e0 [ 394.403484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 394.408337] ? trace_hardirqs_on_caller+0x310/0x310 [ 394.413399] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 394.418419] ? prepare_exit_to_usermode+0x291/0x3b0 [ 394.423442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 394.428293] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:32 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x2000000) 12:06:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000900000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:32 executing program 2 (fault-call:3 fault-nth:14): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 394.626562] FAULT_INJECTION: forcing a failure. [ 394.626562] name failslab, interval 1, probability 0, space 0, times 0 [ 394.638002] CPU: 1 PID: 23419 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 394.645299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.654660] Call Trace: [ 394.657268] dump_stack+0x244/0x39d [ 394.660926] ? dump_stack_print_info.cold.1+0x20/0x20 [ 394.666144] ? mark_held_locks+0x130/0x130 [ 394.666170] ? kernel_text_address+0x79/0xf0 [ 394.666204] should_fail.cold.4+0xa/0x17 [ 394.674832] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 394.683991] ? save_stack+0xa9/0xd0 [ 394.687642] ? save_stack+0x43/0xd0 [ 394.691282] ? kasan_kmalloc+0xc7/0xe0 [ 394.695183] ? kasan_slab_alloc+0x12/0x20 [ 394.699341] ? kmem_cache_alloc+0x12e/0x730 [ 394.703675] ? __nf_conntrack_alloc+0x1aa/0x7c0 [ 394.708355] ? init_conntrack.isra.47+0xff6/0x13c0 [ 394.713750] ? nf_conntrack_in+0xc7d/0x13b0 [ 394.718078] ? ipv4_conntrack_local+0x16a/0x220 [ 394.718093] ? nf_hook_slow+0xc2/0x1c0 [ 394.718111] ? __ip_local_out+0x56e/0xb30 [ 394.718125] ? ip_local_out+0x2d/0x1b0 [ 394.718139] ? iptunnel_xmit+0x56a/0x8d0 [ 394.718158] ? ip_tunnel_xmit+0x15b8/0x3c04 [ 394.726697] ? __gre_xmit+0x5e1/0x980 [ 394.726709] ? ipgre_xmit+0x3e7/0xba0 [ 394.726724] ? dev_hard_start_xmit+0x295/0xc80 [ 394.726744] ? zap_class+0x640/0x640 [ 394.759599] ? bpf_clone_redirect+0x2f6/0x490 [ 394.764110] ? bpf_prog_e2ed69a7d397132f+0x6be/0x1000 [ 394.769322] ? check_preemption_disabled+0x48/0x280 [ 394.774363] ? zap_class+0x640/0x640 [ 394.778102] ? find_held_lock+0x36/0x1c0 [ 394.782187] __should_failslab+0x124/0x180 [ 394.786433] should_failslab+0x9/0x14 [ 394.790247] __kmalloc_track_caller+0x6c/0x760 [ 394.794850] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 394.800137] ? rcu_softirq_qs+0x20/0x20 [ 394.800160] ? nf_ct_ext_add+0x369/0x7b0 [ 394.800182] __krealloc+0x6f/0xb0 [ 394.800206] nf_ct_ext_add+0x369/0x7b0 [ 394.808240] ? nf_ct_ext_destroy+0x370/0x370 [ 394.808255] ? __local_bh_enable_ip+0x160/0x260 12:06:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) 12:06:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00600000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080), 0x28a, &(0x7f0000000000), 0x116}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f00000001c0)='veth0\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x20001, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x33}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) [ 394.808270] ? __local_bh_enable_ip+0x160/0x260 [ 394.808288] ? lockdep_hardirqs_on+0x296/0x5b0 [ 394.808309] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 394.808329] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 394.844655] init_conntrack.isra.47+0x730/0x13c0 [ 394.849420] ? __lock_acquire+0x62f/0x4c20 [ 394.853670] ? nf_conntrack_alloc+0x50/0x50 [ 394.858011] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 394.863227] ? lock_acquire+0x1ed/0x520 [ 394.867203] ? nf_conntrack_in+0x5de/0x13b0 [ 394.871527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 394.877075] ? check_preemption_disabled+0x48/0x280 [ 394.882100] ? kasan_check_read+0x11/0x20 [ 394.886250] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 394.891537] ? trace_hardirqs_off_caller+0x310/0x310 [ 394.896649] nf_conntrack_in+0xc7d/0x13b0 [ 394.900825] ? nf_conntrack_update+0xbc0/0xbc0 [ 394.905439] ? __do_replace+0xab0/0xab0 [ 394.909413] ? zap_class+0x640/0x640 [ 394.913135] ? lock_acquire+0x130/0x520 [ 394.917127] ? nf_ct_l4proto_unregister_sysctl.isra.16+0x130/0x130 [ 394.923448] ipv4_conntrack_local+0x16a/0x220 [ 394.927953] nf_hook_slow+0xc2/0x1c0 [ 394.931676] __ip_local_out+0x56e/0xb30 [ 394.935655] ? ip_finish_output+0xfa0/0xfa0 [ 394.939986] ? __ip_flush_pending_frames.isra.44+0x2d0/0x2d0 [ 394.945799] ? __ip_select_ident+0x16d/0x2a0 [ 394.950219] ? ip_idents_reserve+0x320/0x320 [ 394.954635] ip_local_out+0x2d/0x1b0 [ 394.958356] iptunnel_xmit+0x56a/0x8d0 [ 394.962255] ip_tunnel_xmit+0x15b8/0x3c04 [ 394.966444] ? ip_tunnel_init_net+0xac0/0xac0 [ 394.970946] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 394.975795] ? kasan_check_write+0x14/0x20 [ 394.980047] ? pskb_expand_head+0x6b3/0x10f0 [ 394.984464] ? mark_held_locks+0x130/0x130 [ 394.988701] ? mark_held_locks+0x130/0x130 [ 394.992945] ? skb_release_data+0x880/0x880 [ 394.997272] ? mark_held_locks+0x130/0x130 [ 395.001522] ? mark_held_locks+0x130/0x130 [ 395.005765] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 395.011308] __gre_xmit+0x5e1/0x980 [ 395.014952] ipgre_xmit+0x3e7/0xba0 [ 395.018591] ? gre_tap_xmit+0x590/0x590 [ 395.022573] ? __lock_is_held+0xb5/0x140 [ 395.026651] dev_hard_start_xmit+0x295/0xc80 [ 395.031079] ? dev_direct_xmit+0x6b0/0x6b0 [ 395.035318] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 395.040863] ? netif_skb_features+0x690/0xb70 [ 395.045361] ? rcu_softirq_qs+0x20/0x20 [ 395.049344] ? validate_xmit_xfrm+0x1ef/0xda0 [ 395.053852] ? validate_xmit_skb+0x80c/0xf30 [ 395.058278] ? netif_skb_features+0xb70/0xb70 [ 395.062777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.068328] ? check_preemption_disabled+0x48/0x280 [ 395.073348] ? check_preemption_disabled+0x48/0x280 [ 395.078370] __dev_queue_xmit+0x2f71/0x3ad0 [ 395.082701] ? save_stack+0x43/0xd0 [ 395.086332] ? kasan_kmalloc+0xc7/0xe0 [ 395.090227] ? __kmalloc_node_track_caller+0x50/0x70 [ 395.095344] ? netdev_pick_tx+0x310/0x310 [ 395.099499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.105048] ? check_preemption_disabled+0x48/0x280 [ 395.110080] ? __lock_is_held+0xb5/0x140 [ 395.114154] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 395.119174] ? skb_release_data+0x1c4/0x880 [ 395.123502] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 395.128782] ? kasan_unpoison_shadow+0x35/0x50 [ 395.133373] ? skb_tx_error+0x2f0/0x2f0 [ 395.137359] ? __kmalloc_node_track_caller+0x50/0x70 [ 395.142472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 395.148016] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 395.153568] ? kasan_check_write+0x14/0x20 [ 395.157813] ? pskb_expand_head+0x6b3/0x10f0 [ 395.162240] ? skb_release_data+0x880/0x880 [ 395.166563] ? __alloc_skb+0x770/0x770 [ 395.170468] ? __lock_is_held+0xb5/0x140 [ 395.174541] ? kasan_check_write+0x14/0x20 [ 395.178777] ? __skb_clone+0x6c7/0xa00 [ 395.182677] ? __copy_skb_header+0x6b0/0x6b0 [ 395.187091] ? kmem_cache_alloc+0x33a/0x730 [ 395.191430] ? skb_ensure_writable+0x15e/0x640 [ 395.196021] dev_queue_xmit+0x17/0x20 [ 395.199836] ? dev_queue_xmit+0x17/0x20 [ 395.203817] __bpf_redirect+0x5cf/0xb20 [ 395.207809] bpf_clone_redirect+0x2f6/0x490 [ 395.212142] bpf_prog_e2ed69a7d397132f+0x6be/0x1000 [ 395.217166] ? bpf_test_run+0x175/0x780 [ 395.221165] ? lock_downgrade+0x900/0x900 [ 395.225319] ? ktime_get+0x332/0x400 [ 395.229054] ? find_held_lock+0x36/0x1c0 [ 395.233128] ? lock_acquire+0x1ed/0x520 [ 395.237103] ? bpf_test_run+0x3cb/0x780 [ 395.241088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.246631] ? check_preemption_disabled+0x48/0x280 [ 395.251658] ? kasan_check_read+0x11/0x20 [ 395.255811] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 395.261094] ? rcu_softirq_qs+0x20/0x20 [ 395.265071] ? bpf_cgroup_storage_release+0x220/0x220 [ 395.270272] ? skb_try_coalesce+0x1b70/0x1b70 [ 395.274779] ? bpf_test_run+0x25d/0x780 [ 395.278772] ? netlink_diag_dump+0x2a0/0x2a0 [ 395.283193] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 395.288731] ? bpf_test_init.isra.10+0x70/0x100 [ 395.293406] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 395.298173] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 395.303018] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 395.308570] ? fput+0x130/0x1a0 [ 395.311851] ? __bpf_prog_get+0x9b/0x290 [ 395.315918] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 395.320759] ? bpf_prog_test_run+0x130/0x1a0 [ 395.325179] ? __x64_sys_bpf+0x3d8/0x520 [ 395.329241] ? bpf_prog_get+0x20/0x20 [ 395.333077] ? do_syscall_64+0x1b9/0x820 [ 395.337141] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 395.342515] ? syscall_return_slowpath+0x5e0/0x5e0 [ 395.347444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.352295] ? trace_hardirqs_on_caller+0x310/0x310 [ 395.357318] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 395.362342] ? prepare_exit_to_usermode+0x291/0x3b0 [ 395.367367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.372223] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:33 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x92, 0x51, &(0x7f0000000380)="91ccbe21fa749ff8188086309986a9e6f3ee61aedf0ff081a46639e767eadf6c8ab60f6283b49663f9ad0daba23957f0b493a9a77e5f379a09833f420420d201e3990b85b2d953b82c2ec6f8ef853802ec99ce38465c93c2a468e6e2272e3dfc98b0122250f64e0d578b311719aac78b17df14beed930616f22722eaea4b11520633d14a8bb8b0305289a23383574ab2c7e7", &(0x7f0000000440)=""/81, 0x5}, 0x28) 12:06:33 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x8000a0) 12:06:33 executing program 2 (fault-call:3 fault-nth:15): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:33 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00feffffff0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:33 executing program 5: r0 = socket$kcm(0x10, 0x100000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000005c0)="1300000012008104f900000000ff0000000000", 0xe7}], 0x1, &(0x7f0000002300), 0x0, 0x20004001}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) r2 = socket$kcm(0x29, 0x7, 0x0) socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r2, &(0x7f0000000840)={&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, &(0x7f0000000780)=[{&(0x7f00000000c0)=""/19, 0x13}, {&(0x7f0000000240)=""/113, 0x71}, {&(0x7f00000002c0)=""/120, 0x78}, {&(0x7f0000000340)=""/165, 0xa5}, {&(0x7f0000000400)=""/200, 0xc8}, {&(0x7f0000000500)=""/27, 0x1b}, {&(0x7f0000000540)=""/21, 0x15}, {&(0x7f0000000600)=""/91, 0x5b}, {&(0x7f0000000680)=""/34, 0x22}, {&(0x7f00000006c0)=""/153, 0x99}], 0xa, 0x0, 0x0, 0x6}, 0x41) r3 = socket$kcm(0x29, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r4, 0x63, 0x18}, 0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={r0}) recvmsg(r3, &(0x7f0000009140)={&(0x7f0000009040)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009100)=[{&(0x7f00000090c0)}], 0x1, 0x0, 0x0, 0x1}, 0x10101) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000009180)=r5) socket$kcm(0x29, 0x5f6c62b419cb7254, 0x0) 12:06:33 executing program 1: socketpair(0xa, 0x4, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='/group.stat\x00') r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x7fffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 12:06:33 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b003e0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:33 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x3) [ 395.828814] FAULT_INJECTION: forcing a failure. [ 395.828814] name failslab, interval 1, probability 0, space 0, times 0 [ 395.840188] CPU: 1 PID: 23457 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 395.847475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.856836] Call Trace: [ 395.859442] dump_stack+0x244/0x39d [ 395.863095] ? dump_stack_print_info.cold.1+0x20/0x20 [ 395.868306] ? mark_held_locks+0x130/0x130 [ 395.872560] ? kernel_text_address+0x79/0xf0 12:06:33 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00fffff0000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:33 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x4) [ 395.876991] should_fail.cold.4+0xa/0x17 [ 395.881078] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 395.886206] ? save_stack+0xa9/0xd0 [ 395.889854] ? save_stack+0x43/0xd0 [ 395.893492] ? kasan_kmalloc+0xc7/0xe0 [ 395.897390] ? kasan_slab_alloc+0x12/0x20 [ 395.901552] ? kmem_cache_alloc+0x12e/0x730 [ 395.905886] ? __nf_conntrack_alloc+0x1aa/0x7c0 [ 395.910563] ? init_conntrack.isra.47+0xff6/0x13c0 [ 395.915501] ? nf_conntrack_in+0xc7d/0x13b0 [ 395.919847] ? ipv4_conntrack_local+0x16a/0x220 [ 395.924521] ? nf_hook_slow+0xc2/0x1c0 [ 395.928424] ? __ip_local_out+0x56e/0xb30 [ 395.932586] ? ip_local_out+0x2d/0x1b0 [ 395.936484] ? iptunnel_xmit+0x56a/0x8d0 [ 395.940555] ? ip_tunnel_xmit+0x15b8/0x3c04 [ 395.944885] ? __gre_xmit+0x5e1/0x980 [ 395.948700] ? ipgre_xmit+0x3e7/0xba0 [ 395.952513] ? dev_hard_start_xmit+0x295/0xc80 [ 395.957133] ? zap_class+0x640/0x640 [ 395.960854] ? bpf_clone_redirect+0x2f6/0x490 [ 395.965350] ? bpf_prog_e2ed69a7d397132f+0xad9/0x1000 [ 395.970548] ? check_preemption_disabled+0x48/0x280 [ 395.975578] ? zap_class+0x640/0x640 [ 395.979297] ? find_held_lock+0x36/0x1c0 [ 395.983379] __should_failslab+0x124/0x180 [ 395.987623] should_failslab+0x9/0x14 [ 395.991425] __kmalloc_track_caller+0x6c/0x760 [ 395.996010] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 396.001301] ? rcu_softirq_qs+0x20/0x20 [ 396.005283] ? nf_ct_ext_add+0x369/0x7b0 [ 396.009354] __krealloc+0x6f/0xb0 [ 396.012820] nf_ct_ext_add+0x369/0x7b0 [ 396.016717] ? nf_ct_ext_destroy+0x370/0x370 [ 396.021123] ? __local_bh_enable_ip+0x160/0x260 [ 396.025791] ? __local_bh_enable_ip+0x160/0x260 [ 396.030468] ? lockdep_hardirqs_on+0x296/0x5b0 [ 396.035064] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 396.040261] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.045811] init_conntrack.isra.47+0x730/0x13c0 [ 396.050567] ? __lock_acquire+0x62f/0x4c20 [ 396.054817] ? nf_conntrack_alloc+0x50/0x50 [ 396.059144] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 396.064341] ? lock_acquire+0x1ed/0x520 [ 396.068315] ? nf_conntrack_in+0x5de/0x13b0 [ 396.072641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.078183] ? check_preemption_disabled+0x48/0x280 [ 396.083210] ? kasan_check_read+0x11/0x20 [ 396.087358] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 396.092645] ? trace_hardirqs_off_caller+0x310/0x310 [ 396.097763] nf_conntrack_in+0xc7d/0x13b0 [ 396.101937] ? nf_conntrack_update+0xbc0/0xbc0 [ 396.106546] ? __do_replace+0xab0/0xab0 [ 396.110522] ? zap_class+0x640/0x640 [ 396.114241] ? lock_acquire+0x130/0x520 [ 396.118236] ? nf_ct_l4proto_unregister_sysctl.isra.16+0x130/0x130 [ 396.124559] ipv4_conntrack_local+0x16a/0x220 [ 396.129066] nf_hook_slow+0xc2/0x1c0 [ 396.132794] __ip_local_out+0x56e/0xb30 [ 396.136782] ? ip_finish_output+0xfa0/0xfa0 [ 396.141120] ? __ip_flush_pending_frames.isra.44+0x2d0/0x2d0 [ 396.146925] ? __ip_select_ident+0x16d/0x2a0 [ 396.151338] ? ip_idents_reserve+0x320/0x320 [ 396.155751] ip_local_out+0x2d/0x1b0 [ 396.159473] iptunnel_xmit+0x56a/0x8d0 [ 396.163372] ip_tunnel_xmit+0x15b8/0x3c04 [ 396.167537] ? ip_tunnel_init_net+0xac0/0xac0 [ 396.172046] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 396.176898] ? kasan_check_write+0x14/0x20 [ 396.181139] ? pskb_expand_head+0x6b3/0x10f0 [ 396.185554] ? mark_held_locks+0x130/0x130 [ 396.189790] ? mark_held_locks+0x130/0x130 [ 396.194050] ? skb_release_data+0x880/0x880 [ 396.198380] ? mark_held_locks+0x130/0x130 [ 396.202615] ? print_usage_bug+0xc0/0xc0 [ 396.206689] ? mark_held_locks+0x130/0x130 [ 396.210932] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.216478] __gre_xmit+0x5e1/0x980 [ 396.220120] ipgre_xmit+0x3e7/0xba0 [ 396.223753] ? gre_tap_xmit+0x590/0x590 [ 396.227731] ? __lock_is_held+0xb5/0x140 [ 396.231817] dev_hard_start_xmit+0x295/0xc80 [ 396.236234] ? dev_direct_xmit+0x6b0/0x6b0 [ 396.240474] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.246014] ? netif_skb_features+0x690/0xb70 [ 396.250516] ? rcu_softirq_qs+0x20/0x20 [ 396.254501] ? validate_xmit_xfrm+0x1ef/0xda0 [ 396.259007] ? validate_xmit_skb+0x80c/0xf30 [ 396.263429] ? netif_skb_features+0xb70/0xb70 [ 396.267928] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.273473] ? check_preemption_disabled+0x48/0x280 [ 396.278488] ? check_preemption_disabled+0x48/0x280 [ 396.283513] __dev_queue_xmit+0x2f71/0x3ad0 [ 396.287840] ? save_stack+0x43/0xd0 [ 396.291469] ? kasan_kmalloc+0xc7/0xe0 [ 396.295359] ? __kmalloc_node_track_caller+0x50/0x70 [ 396.300473] ? netdev_pick_tx+0x310/0x310 [ 396.304627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.310166] ? check_preemption_disabled+0x48/0x280 [ 396.315197] ? __lock_is_held+0xb5/0x140 [ 396.319269] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 396.324292] ? skb_release_data+0x1c4/0x880 [ 396.328619] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 396.333900] ? kasan_unpoison_shadow+0x35/0x50 [ 396.338485] ? skb_tx_error+0x2f0/0x2f0 [ 396.342471] ? __kmalloc_node_track_caller+0x50/0x70 [ 396.347576] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 396.353117] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 396.358657] ? kasan_check_write+0x14/0x20 [ 396.362892] ? pskb_expand_head+0x6b3/0x10f0 [ 396.367318] ? skb_release_data+0x880/0x880 [ 396.371641] ? __alloc_skb+0x770/0x770 [ 396.375537] ? __lock_is_held+0xb5/0x140 [ 396.379609] ? kasan_check_write+0x14/0x20 [ 396.383843] ? __skb_clone+0x6c7/0xa00 [ 396.387738] ? __copy_skb_header+0x6b0/0x6b0 [ 396.392144] ? kmem_cache_alloc+0x33a/0x730 [ 396.396481] ? skb_ensure_writable+0x15e/0x640 [ 396.401080] dev_queue_xmit+0x17/0x20 [ 396.404881] ? dev_queue_xmit+0x17/0x20 [ 396.408855] __bpf_redirect+0x5cf/0xb20 [ 396.412843] bpf_clone_redirect+0x2f6/0x490 [ 396.417177] bpf_prog_e2ed69a7d397132f+0xad9/0x1000 [ 396.422195] ? bpf_test_run+0x175/0x780 [ 396.426172] ? lock_downgrade+0x900/0x900 [ 396.430322] ? ktime_get+0x332/0x400 [ 396.434058] ? find_held_lock+0x36/0x1c0 [ 396.438135] ? lock_acquire+0x1ed/0x520 [ 396.442111] ? bpf_test_run+0x3cb/0x780 [ 396.446088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.451629] ? check_preemption_disabled+0x48/0x280 [ 396.456656] ? kasan_check_read+0x11/0x20 [ 396.460811] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 396.466088] ? rcu_softirq_qs+0x20/0x20 [ 396.470066] ? bpf_cgroup_storage_release+0x220/0x220 [ 396.475259] ? skb_try_coalesce+0x1b70/0x1b70 [ 396.479766] ? bpf_test_run+0x25d/0x780 [ 396.483755] ? netlink_diag_dump+0x2a0/0x2a0 [ 396.488171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 396.493707] ? bpf_test_init.isra.10+0x70/0x100 [ 396.498389] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 396.503160] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 396.508009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.513557] ? fput+0x130/0x1a0 [ 396.516837] ? __bpf_prog_get+0x9b/0x290 [ 396.520904] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 396.525744] ? bpf_prog_test_run+0x130/0x1a0 [ 396.530161] ? __x64_sys_bpf+0x3d8/0x520 [ 396.534223] ? bpf_prog_get+0x20/0x20 [ 396.538054] ? do_syscall_64+0x1b9/0x820 [ 396.542116] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 396.547483] ? syscall_return_slowpath+0x5e0/0x5e0 [ 396.552414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.557259] ? trace_hardirqs_on_caller+0x310/0x310 [ 396.562278] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 396.567298] ? prepare_exit_to_usermode+0x291/0x3b0 [ 396.572321] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:06:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x100000000000000) [ 396.577177] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x200000000000000) 12:06:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0x92, 0x51, &(0x7f0000000380)="91ccbe21fa749ff8188086309986a9e6f3ee61aedf0ff081a46639e767eadf6c8ab60f6283b49663f9ad0daba23957f0b493a9a77e5f379a09833f420420d201e3990b85b2d953b82c2ec6f8ef853802ec99ce38465c93c2a468e6e2272e3dfc98b0122250f64e0d578b311719aac78b17df14beed930616f22722eaea4b11520633d14a8bb8b0305289a23383574ab2c7e7", &(0x7f0000000440)=""/81, 0x5}, 0x28) 12:06:34 executing program 5: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x7fffffff, 0x9, 0x1, 0x8, 0x0, 0x100, 0x2, 0xa, 0x8, 0xffffffff7fffffff, 0x3, 0xdf, 0x1000, 0x8, 0x6, 0x3d2, 0x3, 0x5, 0x0, 0x1000, 0x7ff, 0x54e5d6f5, 0x0, 0x5, 0x101, 0xffffffff00000000, 0x0, 0x81, 0x2, 0x70, 0x4, 0x3ff, 0xff, 0x7fffffff, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x2, 0x9}, 0x8a10, 0x0, 0x9, 0x7, 0x6, 0x9, 0x3}, 0x0, 0x8, 0xffffffffffffff9c, 0x1) perf_event_open$cgroup(&(0x7f00000021c0)={0x0, 0x70, 0x6, 0x0, 0x2, 0x4, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x9aa, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x5, 0xeba, 0xfff, 0x0, 0x4, 0x8, 0x1, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2dfa, 0x10001, 0x0, 0x4, 0x2, @perf_config_ext={0xfffffffffffffc01, 0x1}, 0x34, 0x0, 0xffffffffffffffe0, 0x0, 0x193}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001a40)='./cgroup.net/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000280)={r0}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000001c80)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000240)={r2}) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0xffffff5f) socket$kcm(0x29, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xd, &(0x7f00000000c0), 0x69b) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x297ef) openat$cgroup_ro(r1, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) sendmsg(r5, &(0x7f0000000400)={&(0x7f0000000380)=@in={0x2, 0x4e20, @local}, 0x80, &(0x7f0000000980)=[{&(0x7f0000000540)="6f4843fd6989a26b1499bc045b167bd3c25e69075aaa21b4a7325f3f1d305769a0920037c08c33992b9c3139abc4ef76d2d2a7b76f4805526941c1c92f0c1173f4b6367a2788be3ca4c5feda73f182328b7b276ad78500982c8ed4e0ea6e8a3b1813abd85db41810a0ab146d444b032493a5861473c54f8ea4", 0x79}, {&(0x7f00000005c0)="79d4f7275611bd6337d4232efc3d207e75f63475e51de040a916d5852fe79a74d7a58b94f11460651223c6a935af34821d2e07e67a17ade721aa5e142f9822aecb85cdbb5bffdfdb58f9452d03fa1f42fe5d7dfba885c7932269bf81704f04eaa5e0baec3e49b9175c5fd2bbb0adff", 0x6f}, {&(0x7f0000000640)="ccef619ec49c0de7461724365ec6c1c7af30156264e69498f6d89a803a94f94830e133765c26fcf1519ff7dcf35815e92b67be6fc482b8753a20583d1d50f2a3d1fa8529119f4cc30bc55899956e05bb4624c9cb469253080cfe7b847d2e2d9f5a45b55801736c56cec9ef27fc273c27700338e9c295af8cfbc803dcfc30043a5b79bd1c4404eee811bfd1c951c493fd79e8efa46429e72e94fe445288483ddf75dd43866bd07c554053ada61b88f86f59521389fb439190e7e9615a2b6c8d5a46517cbe0c30ed74fc651fe7d212cf", 0xcf}, {&(0x7f0000000740)="c8f4a37c7eb7169c8c269477d879f4471d31bef119ba62653637f8ed27b23c5f2d4b0be0c048ff07c1ea018b95f7ecc951b4ee6828cdb91f449dcd06a76ab2aa39d0225e99c1684dd59cdff2b6e6ca29659e935b332d860334b09317d73bac7d30805fe68d0a87e6344ab3731b8688", 0x6f}, {&(0x7f00000007c0)="f66f3367080bd1e16422894d5fcea94cd0b8fd1f9f9e8cf0797fb54af15600bf1282c9d2bddc1abaef95f6d019c98ef8556afd0ec2e263ac2b573db7fa3262a1f11d3fd140a3fa621c1a615ca3fb0cbe54049022813c5b0203fc8882744cbb975cd472ec81fe3f051cb7544e536a937a0192583a91e418ab818f797ba1e4cd3af4d3c892281378363a16da17955e6428976ae405849c113355165dd3f2a9154e091641cd46bbe697960d4bd0a04a59da95f6c53de85fa257b56ee35b28217c0d8bb5f795ce2eee5b5ed930208b", 0xcd}, {&(0x7f00000008c0)="19008cee76eece781feb34ae502cc1e6b84409f8d598e5f84bab7883a225294579eb54785a89fd53f3927555375402f713814f4c8bf73639355953d573c7653fe552ce0622b8b8d1f29ef2563cc16c6de8dea04336c4d4ebb63b47657b06b864a6a61bc0ab585c554ee8dd27b24c40eb1f515b4faebabf56044141691eb9a12724aa937af199e017b30ebd325629251d5ea1c89be8d9d6f17108b8cfa73d18012aafdd7eebfd83bd344957af9408c294ee", 0xb1}], 0x6, 0x0, 0x0, 0x4801}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000004c0)='-ppp1\x00'}, 0x30) 12:06:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x1000000) 12:06:34 executing program 2 (fault-call:3 fault-nth:16): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:34 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000003e0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000000)=r1) write$cgroup_int(r1, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x8001) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x7fffff) [ 397.055607] FAULT_INJECTION: forcing a failure. [ 397.055607] name failslab, interval 1, probability 0, space 0, times 0 [ 397.066981] CPU: 1 PID: 23496 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 397.074262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.083615] Call Trace: [ 397.086222] dump_stack+0x244/0x39d [ 397.089864] ? dump_stack_print_info.cold.1+0x20/0x20 [ 397.095068] ? zap_class+0x640/0x640 [ 397.098799] should_fail.cold.4+0xa/0x17 [ 397.102873] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 397.107985] ? find_held_lock+0x36/0x1c0 [ 397.112069] ? is_bpf_text_address+0xac/0x170 [ 397.116568] ? lock_downgrade+0x900/0x900 [ 397.120723] ? check_preemption_disabled+0x48/0x280 [ 397.125747] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 397.130677] ? kasan_check_read+0x11/0x20 [ 397.134832] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 397.140115] ? rcu_softirq_qs+0x20/0x20 [ 397.144089] ? rcu_softirq_qs+0x20/0x20 [ 397.148066] ? unwind_dump+0x190/0x190 [ 397.151967] ? is_bpf_text_address+0xd3/0x170 [ 397.156472] ? kernel_text_address+0x79/0xf0 [ 397.160888] ? __kernel_text_address+0xd/0x40 [ 397.165384] ? unwind_get_return_address+0x61/0xa0 [ 397.170323] ? __save_stack_trace+0x8d/0xf0 [ 397.174654] __should_failslab+0x124/0x180 [ 397.178898] should_failslab+0x9/0x14 [ 397.182707] kmem_cache_alloc_node_trace+0x5a/0x740 [ 397.187725] ? save_stack+0xa9/0xd0 [ 397.191357] ? save_stack+0x43/0xd0 [ 397.194992] __kmalloc_node_track_caller+0x3c/0x70 [ 397.199931] __kmalloc_reserve.isra.40+0x41/0xe0 [ 397.204698] pskb_expand_head+0x230/0x10f0 [ 397.208941] ? memcpy+0x45/0x50 [ 397.212229] ? __copy_skb_header+0x350/0x6b0 [ 397.216638] ? skb_release_data+0x880/0x880 [ 397.220963] ? __alloc_skb+0x770/0x770 [ 397.224863] ? __lock_is_held+0xb5/0x140 [ 397.228932] ? kasan_check_write+0x14/0x20 [ 397.233170] ? __skb_clone+0x6c7/0xa00 [ 397.237067] ? __copy_skb_header+0x6b0/0x6b0 [ 397.241477] ? kmem_cache_alloc+0x33a/0x730 [ 397.245814] skb_ensure_writable+0x3dd/0x640 [ 397.250231] ? skb_checksum_setup+0xaa0/0xaa0 [ 397.254729] ? check_preemption_disabled+0x48/0x280 [ 397.259753] ? __this_cpu_preempt_check+0x1c/0x20 [ 397.264595] ? __bpf_redirect+0x54b/0xb20 [ 397.268753] bpf_clone_redirect+0x14a/0x490 [ 397.273090] bpf_prog_e2ed69a7d397132f+0xabe/0x1000 [ 397.278110] ? bpf_test_run+0x175/0x780 [ 397.282088] ? lock_downgrade+0x900/0x900 [ 397.286239] ? ktime_get+0x332/0x400 [ 397.289964] ? find_held_lock+0x36/0x1c0 [ 397.294044] ? lock_acquire+0x1ed/0x520 [ 397.298021] ? bpf_test_run+0x3cb/0x780 [ 397.302014] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.307563] ? check_preemption_disabled+0x48/0x280 [ 397.312592] ? kasan_check_read+0x11/0x20 [ 397.316742] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 397.322021] ? rcu_softirq_qs+0x20/0x20 [ 397.326007] ? bpf_cgroup_storage_release+0x220/0x220 [ 397.331216] ? skb_try_coalesce+0x1b70/0x1b70 [ 397.335724] ? bpf_test_run+0x25d/0x780 [ 397.339719] ? netlink_diag_dump+0x2a0/0x2a0 [ 397.344138] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 397.349678] ? bpf_test_init.isra.10+0x70/0x100 [ 397.354352] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 397.359142] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 397.363987] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 397.369526] ? fput+0x130/0x1a0 [ 397.372814] ? __bpf_prog_get+0x9b/0x290 [ 397.376883] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 397.381740] ? bpf_prog_test_run+0x130/0x1a0 [ 397.386153] ? __x64_sys_bpf+0x3d8/0x520 [ 397.390215] ? bpf_prog_get+0x20/0x20 [ 397.394046] ? do_syscall_64+0x1b9/0x820 [ 397.398110] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 12:06:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x300) [ 397.403476] ? syscall_return_slowpath+0x5e0/0x5e0 [ 397.408405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.413255] ? trace_hardirqs_on_caller+0x310/0x310 [ 397.418277] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 397.423299] ? prepare_exit_to_usermode+0x291/0x3b0 [ 397.428332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.433192] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:35 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000010000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x2) 12:06:35 executing program 2 (fault-call:3 fault-nth:17): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x8001a0ffffffff) 12:06:35 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00020000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 397.836409] FAULT_INJECTION: forcing a failure. [ 397.836409] name failslab, interval 1, probability 0, space 0, times 0 [ 397.847893] CPU: 0 PID: 23529 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 397.855184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.864548] Call Trace: [ 397.867166] dump_stack+0x244/0x39d [ 397.870829] ? dump_stack_print_info.cold.1+0x20/0x20 [ 397.876046] ? zap_class+0x640/0x640 [ 397.879785] should_fail.cold.4+0xa/0x17 [ 397.883863] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 397.888983] ? find_held_lock+0x36/0x1c0 [ 397.893078] ? is_bpf_text_address+0xac/0x170 [ 397.897593] ? lock_downgrade+0x900/0x900 [ 397.901753] ? check_preemption_disabled+0x48/0x280 [ 397.906788] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 397.911728] ? kasan_check_read+0x11/0x20 [ 397.915892] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 397.921177] ? rcu_softirq_qs+0x20/0x20 [ 397.925166] ? rcu_softirq_qs+0x20/0x20 [ 397.929149] ? unwind_dump+0x190/0x190 [ 397.933068] ? is_bpf_text_address+0xd3/0x170 [ 397.937576] ? kernel_text_address+0x79/0xf0 [ 397.941999] ? __kernel_text_address+0xd/0x40 [ 397.946517] ? unwind_get_return_address+0x61/0xa0 [ 397.951462] ? __save_stack_trace+0x8d/0xf0 [ 397.955803] __should_failslab+0x124/0x180 [ 397.960064] should_failslab+0x9/0x14 [ 397.963883] kmem_cache_alloc_node_trace+0x5a/0x740 [ 397.968912] ? save_stack+0xa9/0xd0 [ 397.972553] ? save_stack+0x43/0xd0 [ 397.976202] __kmalloc_node_track_caller+0x3c/0x70 [ 397.981148] __kmalloc_reserve.isra.40+0x41/0xe0 [ 397.985926] pskb_expand_head+0x230/0x10f0 [ 397.990182] ? memcpy+0x45/0x50 [ 397.993478] ? __copy_skb_header+0x350/0x6b0 [ 397.997900] ? skb_release_data+0x880/0x880 [ 398.002232] ? __alloc_skb+0x770/0x770 [ 398.006144] ? __lock_is_held+0xb5/0x140 [ 398.010228] ? kasan_check_write+0x14/0x20 [ 398.014473] ? __skb_clone+0x6c7/0xa00 [ 398.018380] ? __copy_skb_header+0x6b0/0x6b0 [ 398.022799] ? kmem_cache_alloc+0x33a/0x730 [ 398.027147] skb_ensure_writable+0x3dd/0x640 [ 398.031575] ? skb_checksum_setup+0xaa0/0xaa0 [ 398.036085] ? check_preemption_disabled+0x48/0x280 [ 398.041122] ? __this_cpu_preempt_check+0x1c/0x20 [ 398.045980] ? __bpf_redirect+0x54b/0xb20 [ 398.050148] bpf_clone_redirect+0x14a/0x490 [ 398.054495] bpf_prog_e2ed69a7d397132f+0x9a7/0x1000 [ 398.059529] ? bpf_test_run+0x175/0x780 [ 398.063523] ? lock_downgrade+0x900/0x900 [ 398.067687] ? ktime_get+0x332/0x400 [ 398.071419] ? find_held_lock+0x36/0x1c0 [ 398.075503] ? lock_acquire+0x1ed/0x520 [ 398.079493] ? bpf_test_run+0x3cb/0x780 [ 398.083480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.089050] ? check_preemption_disabled+0x48/0x280 [ 398.094086] ? kasan_check_read+0x11/0x20 [ 398.098248] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 398.103533] ? rcu_softirq_qs+0x20/0x20 [ 398.107517] ? bpf_cgroup_storage_release+0x220/0x220 [ 398.112752] ? skb_try_coalesce+0x1b70/0x1b70 [ 398.117273] ? bpf_test_run+0x25d/0x780 [ 398.121281] ? netlink_diag_dump+0x2a0/0x2a0 [ 398.125714] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 398.131265] ? bpf_test_init.isra.10+0x70/0x100 [ 398.135954] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 398.140732] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 398.145589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 398.151145] ? fput+0x130/0x1a0 [ 398.154434] ? __bpf_prog_get+0x9b/0x290 [ 398.158511] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 398.163364] ? bpf_prog_test_run+0x130/0x1a0 [ 398.167789] ? __x64_sys_bpf+0x3d8/0x520 [ 398.171859] ? bpf_prog_get+0x20/0x20 [ 398.175698] ? do_syscall_64+0x1b9/0x820 [ 398.179773] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 398.185152] ? syscall_return_slowpath+0x5e0/0x5e0 [ 398.190178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 398.195043] ? trace_hardirqs_on_caller+0x310/0x310 [ 398.200080] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 398.205111] ? prepare_exit_to_usermode+0x291/0x3b0 [ 398.210143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 398.215005] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:36 executing program 1: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='rdma.current\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x4255b) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x7fffff) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) 12:06:36 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x400000000000000) 12:06:36 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00040000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:36 executing program 2 (fault-call:3 fault-nth:18): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 398.684633] FAULT_INJECTION: forcing a failure. [ 398.684633] name failslab, interval 1, probability 0, space 0, times 0 [ 398.695948] CPU: 1 PID: 23553 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 398.703236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.713052] Call Trace: [ 398.715658] dump_stack+0x244/0x39d [ 398.719300] ? dump_stack_print_info.cold.1+0x20/0x20 [ 398.724503] ? __lock_acquire+0x62f/0x4c20 [ 398.728742] ? kasan_check_read+0x11/0x20 [ 398.732907] should_fail.cold.4+0xa/0x17 [ 398.736976] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 398.742083] ? __lock_acquire+0x62f/0x4c20 [ 398.746325] ? find_held_lock+0x36/0x1c0 [ 398.750401] ? mark_held_locks+0x130/0x130 [ 398.754639] ? zap_class+0x640/0x640 [ 398.758419] ? print_usage_bug+0xc0/0xc0 [ 398.762485] ? trace_hardirqs_off_caller+0x310/0x310 [ 398.767593] ? zap_class+0x640/0x640 [ 398.771320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.776863] ? check_preemption_disabled+0x48/0x280 [ 398.781895] ? __lock_is_held+0xb5/0x140 [ 398.785972] __should_failslab+0x124/0x180 [ 398.790221] should_failslab+0x9/0x14 [ 398.794024] kmem_cache_alloc+0x47/0x730 [ 398.798102] ? ip_mc_drop_socket+0x270/0x270 [ 398.802521] dst_alloc+0xbb/0x1d0 [ 398.805983] rt_dst_alloc+0x105/0x540 [ 398.809786] ? fnhe_flush_routes+0x480/0x480 [ 398.814208] ? __lock_is_held+0xb5/0x140 [ 398.818286] ip_route_output_key_hash_rcu+0xa57/0x3490 [ 398.823563] ? rcu_softirq_qs+0x20/0x20 [ 398.827548] ? ip_route_input_noref+0x260/0x260 [ 398.832222] ? kernel_text_address+0x79/0xf0 [ 398.836638] ? __kernel_text_address+0xd/0x40 [ 398.841140] ? unwind_get_return_address+0x61/0xa0 [ 398.846079] ? __save_stack_trace+0x8d/0xf0 [ 398.850420] ? lock_acquire+0x1ed/0x520 [ 398.854402] ? ip_route_output_key_hash+0x1ab/0x3b0 [ 398.859424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.864970] ? check_preemption_disabled+0x48/0x280 [ 398.870003] ? kasan_check_read+0x11/0x20 [ 398.874158] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 398.879436] ? pskb_expand_head+0x3bb/0x10f0 [ 398.883850] ? rcu_softirq_qs+0x20/0x20 [ 398.887825] ? dev_queue_xmit+0x17/0x20 [ 398.891813] ? bpf_prog_e2ed69a7d397132f+0xc95/0x1000 [ 398.897009] ? trace_hardirqs_off+0xb8/0x310 [ 398.901440] ip_route_output_key_hash+0x240/0x3b0 [ 398.906294] ? ip_route_output_key_hash_rcu+0x3490/0x3490 [ 398.911850] ? kfree+0x11e/0x230 [ 398.915225] ip_route_output_flow+0x28/0xc0 [ 398.919558] ip_tunnel_xmit+0x19a8/0x3c04 [ 398.923726] ? ip_tunnel_init_net+0xac0/0xac0 [ 398.928229] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 398.933082] ? kasan_check_write+0x14/0x20 [ 398.937320] ? pskb_expand_head+0x6b3/0x10f0 [ 398.941737] ? mark_held_locks+0x130/0x130 [ 398.945974] ? mark_held_locks+0x130/0x130 [ 398.950225] ? skb_release_data+0x880/0x880 [ 398.954555] ? mark_held_locks+0x130/0x130 [ 398.958811] ? mark_held_locks+0x130/0x130 [ 398.963065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 398.968614] __gre_xmit+0x5e1/0x980 [ 398.972258] ipgre_xmit+0x3e7/0xba0 [ 398.975890] ? gre_tap_xmit+0x590/0x590 [ 398.979874] ? __lock_is_held+0xb5/0x140 [ 398.983954] dev_hard_start_xmit+0x295/0xc80 [ 398.988374] ? dev_direct_xmit+0x6b0/0x6b0 [ 398.992615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 398.998162] ? netif_skb_features+0x690/0xb70 [ 399.002658] ? rcu_softirq_qs+0x20/0x20 [ 399.006639] ? validate_xmit_xfrm+0x1ef/0xda0 [ 399.011150] ? validate_xmit_skb+0x80c/0xf30 [ 399.015574] ? netif_skb_features+0xb70/0xb70 [ 399.020079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.025623] ? check_preemption_disabled+0x48/0x280 [ 399.030642] ? check_preemption_disabled+0x48/0x280 [ 399.035672] __dev_queue_xmit+0x2f71/0x3ad0 [ 399.040001] ? save_stack+0x43/0xd0 [ 399.043640] ? kasan_kmalloc+0xc7/0xe0 [ 399.047530] ? __kmalloc_node_track_caller+0x50/0x70 [ 399.052650] ? netdev_pick_tx+0x310/0x310 [ 399.056816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.062365] ? check_preemption_disabled+0x48/0x280 [ 399.067399] ? __lock_is_held+0xb5/0x140 [ 399.071476] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 399.076496] ? skb_release_data+0x1c4/0x880 [ 399.080833] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 399.086115] ? kasan_unpoison_shadow+0x35/0x50 [ 399.090704] ? skb_tx_error+0x2f0/0x2f0 [ 399.094689] ? __kmalloc_node_track_caller+0x50/0x70 [ 399.099798] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.105345] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 399.110888] ? kasan_check_write+0x14/0x20 [ 399.115130] ? pskb_expand_head+0x6b3/0x10f0 [ 399.119553] ? skb_release_data+0x880/0x880 [ 399.123875] ? __alloc_skb+0x770/0x770 [ 399.127777] ? __lock_is_held+0xb5/0x140 [ 399.131854] ? kasan_check_write+0x14/0x20 [ 399.136088] ? __skb_clone+0x6c7/0xa00 [ 399.139983] ? __copy_skb_header+0x6b0/0x6b0 [ 399.144391] ? kmem_cache_alloc+0x33a/0x730 [ 399.148729] ? skb_ensure_writable+0x15e/0x640 [ 399.153319] dev_queue_xmit+0x17/0x20 [ 399.157135] ? dev_queue_xmit+0x17/0x20 [ 399.161113] __bpf_redirect+0x5cf/0xb20 [ 399.165125] bpf_clone_redirect+0x2f6/0x490 [ 399.169477] bpf_prog_e2ed69a7d397132f+0xc95/0x1000 [ 399.174497] ? bpf_test_run+0x175/0x780 [ 399.178481] ? lock_downgrade+0x900/0x900 [ 399.182634] ? ktime_get+0x332/0x400 [ 399.186360] ? find_held_lock+0x36/0x1c0 [ 399.190433] ? lock_acquire+0x1ed/0x520 [ 399.194411] ? bpf_test_run+0x3cb/0x780 [ 399.198392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.203933] ? check_preemption_disabled+0x48/0x280 [ 399.208959] ? kasan_check_read+0x11/0x20 [ 399.213113] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 399.218394] ? rcu_softirq_qs+0x20/0x20 [ 399.222369] ? bpf_cgroup_storage_release+0x220/0x220 [ 399.227567] ? skb_try_coalesce+0x1b70/0x1b70 [ 399.232085] ? bpf_test_run+0x25d/0x780 [ 399.236082] ? netlink_diag_dump+0x2a0/0x2a0 [ 399.240503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.246053] ? bpf_test_init.isra.10+0x70/0x100 [ 399.250734] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 399.255499] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 399.260344] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 399.265882] ? fput+0x130/0x1a0 [ 399.269165] ? __bpf_prog_get+0x9b/0x290 [ 399.273235] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 399.278081] ? bpf_prog_test_run+0x130/0x1a0 [ 399.282504] ? __x64_sys_bpf+0x3d8/0x520 12:06:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0xa0018000) [ 399.286570] ? bpf_prog_get+0x20/0x20 [ 399.290394] ? do_syscall_64+0x1b9/0x820 [ 399.294460] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 399.299831] ? syscall_return_slowpath+0x5e0/0x5e0 [ 399.304759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 399.309612] ? trace_hardirqs_on_caller+0x310/0x310 [ 399.314631] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 399.319651] ? prepare_exit_to_usermode+0x291/0x3b0 [ 399.324673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 399.329527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:37 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00180000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:37 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x3000000) 12:06:37 executing program 2 (fault-call:3 fault-nth:19): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:37 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1ff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:37 executing program 1: r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x12001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000100)='ipddp0\x00', r1}, 0x10) r3 = gettid() socketpair(0x9, 0x6, 0xeb, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r3, r2, 0x0, 0x5, &(0x7f0000000380)='ppp1\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000340)={r6, 0xfffffffffffffedb, &(0x7f0000000540)}, 0x10) socketpair(0x2, 0x803, 0x6, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="000080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0xc0185879, 0x20000000) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x297ef) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x5, 0x5, 0xfff, 0xab0, 0x4, r4, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4, 0x7fb, 0x3, 0x7fff, 0x1, r6, 0x4}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0x10, 0x1fe, 0x0, 0x5, 0x0, r7, 0x8000069}, 0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ipddp0\x00'}) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000480)}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000280)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x4, 0x6, 0x1, 0x8001, 0x0, 0x68, 0x800, 0x2, 0x9, 0x6d, 0xd9, 0x4, 0x5a, 0x2, 0x80, 0x5, 0x0, 0x3, 0x1, 0x100, 0x7, 0x8, 0x6c, 0x20, 0x1f, 0x2, 0x9, 0x7, 0x7, 0x6, 0x2, 0x800, 0x8c, 0x4, 0x3, 0x80, 0x0, 0x8001, 0x6, @perf_config_ext={0xe7e0, 0x1f}, 0x6, 0x100000001, 0x5, 0x0, 0x5, 0x20c0, 0x9}, r3, 0xe, r5, 0x2) [ 399.702949] audit: type=1804 audit(1542110797.660:189): pid=23583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name=2F02726F75702E73746170 dev="sda1" ino=16523 res=1 [ 399.745107] FAULT_INJECTION: forcing a failure. [ 399.745107] name failslab, interval 1, probability 0, space 0, times 0 [ 399.756409] CPU: 1 PID: 23573 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 399.763697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.773064] Call Trace: [ 399.775679] dump_stack+0x244/0x39d [ 399.779341] ? dump_stack_print_info.cold.1+0x20/0x20 [ 399.784558] ? nf_hook_slow+0x11e/0x1c0 [ 399.788571] should_fail.cold.4+0xa/0x17 12:06:37 executing program 5: r0 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x100, 0x63, 0x9, 0x7e, 0x0, 0x2, 0x0, 0x2, 0x3ff, 0x1, 0x7, 0x4, 0x3, 0x80000001, 0x1, 0xffffffff, 0x7, 0x0, 0x46ed, 0x0, 0x6f, 0x4, 0x2, 0x6def, 0x2, 0xdf8, 0x6256, 0xff, 0x4c, 0x32e7, 0x9, 0x0, 0x3, 0x1, 0x4, 0x200, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x6, 0x79, 0xf, 0x2, 0x6b, 0x7f}, 0x0, 0xa, 0xffffffffffffff9c, 0x3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='threaded\x00'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x3) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x3, 0x9, &(0x7f0000000700)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)="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") socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000c80), &(0x7f00000003c0)="78f1450e181c736edfd3edc0ade4d0c4aa114b05919605bedfaedd3dad3bab78511d45de7f30eca59309094abb5a9ceae20775885496d5a08aefb94a1e1821656336fb209462bf796f24246ccbbf57e83693a5b6de91c1f6411a44b2b4649f0ed8d4ca4e534ce238c4ca503f9fc47c53a80d20882566"}, 0x20) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000480)=@raw, &(0x7f00000004c0)="7371367a86f5c188b44d", 0x10000, 0xed, &(0x7f0000000500)=""/237, 0xffffffffffffffff, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r0) 12:06:37 executing program 3: socketpair(0xa, 0x803, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip_vti0\x00', 0x200}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:37 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000050000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 399.792656] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 399.797776] ? lock_downgrade+0x900/0x900 [ 399.801949] ? check_preemption_disabled+0x48/0x280 [ 399.806988] ? kasan_check_read+0x11/0x20 [ 399.811144] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 399.816431] ? rcu_softirq_qs+0x20/0x20 [ 399.820421] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 399.825447] ? nf_hook_slow+0x11e/0x1c0 [ 399.829443] ? ip_fragment.constprop.50+0x240/0x240 [ 399.834468] ? __ip_local_out+0x5e2/0xb30 [ 399.838625] ? ip_finish_output+0xfa0/0xfa0 [ 399.842963] ? print_usage_bug+0xc0/0xc0 [ 399.847043] ? __ip_select_ident+0x16d/0x2a0 [ 399.851459] ? ip_idents_reserve+0x320/0x320 [ 399.855877] ? print_usage_bug+0xc0/0xc0 [ 399.859950] __should_failslab+0x124/0x180 [ 399.864197] should_failslab+0x9/0x14 [ 399.868046] kmem_cache_alloc_node_trace+0x5a/0x740 [ 399.873076] ? ip_tunnel_xmit+0x15b8/0x3c04 [ 399.877413] __kmalloc_node_track_caller+0x3c/0x70 [ 399.882353] __kmalloc_reserve.isra.40+0x41/0xe0 [ 399.887119] pskb_expand_head+0x230/0x10f0 [ 399.891359] ? mark_held_locks+0x130/0x130 [ 399.895601] ? mark_held_locks+0x130/0x130 [ 399.899848] ? skb_release_data+0x880/0x880 [ 399.904178] ? mark_held_locks+0x130/0x130 [ 399.908429] ? mark_held_locks+0x130/0x130 [ 399.912666] ? zap_class+0x640/0x640 [ 399.916387] ? __lock_acquire+0x62f/0x4c20 [ 399.920628] ? __gre_xmit+0x5e1/0x980 [ 399.924437] ? zap_class+0x640/0x640 [ 399.928152] ? zap_class+0x640/0x640 [ 399.931872] ipgre_xmit+0x679/0xba0 [ 399.935507] ? gre_tap_xmit+0x590/0x590 [ 399.939485] ? __lock_is_held+0xb5/0x140 [ 399.943566] dev_hard_start_xmit+0x295/0xc80 [ 399.947987] ? dev_direct_xmit+0x6b0/0x6b0 [ 399.952228] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 399.957774] ? netif_skb_features+0x690/0xb70 [ 399.962273] ? rcu_softirq_qs+0x20/0x20 [ 399.966261] ? validate_xmit_xfrm+0x1ef/0xda0 [ 399.970773] ? validate_xmit_skb+0x80c/0xf30 [ 399.975198] ? netif_skb_features+0xb70/0xb70 [ 399.979705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.985251] ? check_preemption_disabled+0x48/0x280 [ 399.990272] ? check_preemption_disabled+0x48/0x280 [ 399.995303] __dev_queue_xmit+0x2f71/0x3ad0 [ 399.999633] ? save_stack+0x43/0xd0 [ 400.003262] ? kasan_kmalloc+0xc7/0xe0 [ 400.007149] ? __kmalloc_node_track_caller+0x50/0x70 [ 400.012274] ? netdev_pick_tx+0x310/0x310 [ 400.016441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.021985] ? check_preemption_disabled+0x48/0x280 [ 400.027020] ? __lock_is_held+0xb5/0x140 [ 400.031111] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 400.036137] ? skb_release_data+0x1c4/0x880 [ 400.040470] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 400.045758] ? kasan_unpoison_shadow+0x35/0x50 [ 400.050349] ? skb_tx_error+0x2f0/0x2f0 [ 400.054335] ? __kmalloc_node_track_caller+0x50/0x70 [ 400.059453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.065000] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 400.070554] ? kasan_check_write+0x14/0x20 [ 400.074797] ? pskb_expand_head+0x6b3/0x10f0 [ 400.079228] ? skb_release_data+0x880/0x880 [ 400.083556] ? __alloc_skb+0x770/0x770 [ 400.087457] ? __lock_is_held+0xb5/0x140 [ 400.091531] ? kasan_check_write+0x14/0x20 [ 400.095768] ? __skb_clone+0x6c7/0xa00 [ 400.099664] ? __copy_skb_header+0x6b0/0x6b0 [ 400.104080] ? kmem_cache_alloc+0x33a/0x730 [ 400.108417] ? skb_ensure_writable+0x15e/0x640 [ 400.113012] dev_queue_xmit+0x17/0x20 [ 400.116827] ? dev_queue_xmit+0x17/0x20 [ 400.120813] __bpf_redirect+0x5cf/0xb20 [ 400.124795] bpf_clone_redirect+0x2f6/0x490 [ 400.129142] bpf_prog_e2ed69a7d397132f+0x28a/0x1000 [ 400.134161] ? bpf_test_run+0x175/0x780 [ 400.138143] ? lock_downgrade+0x900/0x900 [ 400.142295] ? ktime_get+0x332/0x400 [ 400.146026] ? find_held_lock+0x36/0x1c0 [ 400.150114] ? lock_acquire+0x1ed/0x520 [ 400.154096] ? bpf_test_run+0x3cb/0x780 [ 400.158080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.163626] ? check_preemption_disabled+0x48/0x280 [ 400.168658] ? kasan_check_read+0x11/0x20 [ 400.172813] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.178101] ? rcu_softirq_qs+0x20/0x20 [ 400.182078] ? bpf_cgroup_storage_release+0x220/0x220 [ 400.187283] ? skb_try_coalesce+0x1b70/0x1b70 [ 400.191798] ? bpf_test_run+0x25d/0x780 [ 400.195793] ? netlink_diag_dump+0x2a0/0x2a0 [ 400.200221] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.205764] ? bpf_test_init.isra.10+0x70/0x100 [ 400.210442] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 400.215213] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 400.220065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 400.225608] ? fput+0x130/0x1a0 [ 400.228892] ? __bpf_prog_get+0x9b/0x290 [ 400.232960] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 400.237810] ? bpf_prog_test_run+0x130/0x1a0 [ 400.242230] ? __x64_sys_bpf+0x3d8/0x520 [ 400.246292] ? bpf_prog_get+0x20/0x20 [ 400.250119] ? do_syscall_64+0x1b9/0x820 [ 400.254184] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 400.259554] ? syscall_return_slowpath+0x5e0/0x5e0 [ 400.264486] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 400.269338] ? trace_hardirqs_on_caller+0x310/0x310 [ 400.274358] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 400.279381] ? prepare_exit_to_usermode+0x291/0x3b0 [ 400.284408] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 400.289271] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) 12:06:38 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000600000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) r3 = getpid() getpid() r4 = perf_event_open(&(0x7f0000001740)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x9586}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x4) recvmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000900), 0x0, 0x0, 0x0, 0x8000}, 0x2) close(r4) 12:06:38 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x6, 0x1, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xc000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000000c0)={'erspan0\x00', @dev={[], 0x19}}) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:38 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00f00000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:38 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_type(r0, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) 12:06:38 executing program 2 (fault-call:3 fault-nth:20): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:38 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000400000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:38 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000000)='syzkaller\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 400.730830] FAULT_INJECTION: forcing a failure. [ 400.730830] name failslab, interval 1, probability 0, space 0, times 0 [ 400.742156] CPU: 1 PID: 23629 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 400.749437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.749445] Call Trace: [ 400.749475] dump_stack+0x244/0x39d [ 400.749506] ? dump_stack_print_info.cold.1+0x20/0x20 [ 400.765071] should_fail.cold.4+0xa/0x17 [ 400.765091] ? __lock_acquire+0x62f/0x4c20 [ 400.765112] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 400.765142] ? zap_class+0x640/0x640 [ 400.787408] ? is_bpf_text_address+0xac/0x170 [ 400.791922] ? lock_downgrade+0x900/0x900 [ 400.796083] ? check_preemption_disabled+0x48/0x280 [ 400.801120] ? find_held_lock+0x36/0x1c0 [ 400.805206] ? __nf_conntrack_find_get.part.44+0x10de/0x1cf0 [ 400.811019] ? lock_downgrade+0x900/0x900 [ 400.815192] ? check_preemption_disabled+0x48/0x280 [ 400.820221] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 400.825162] ? kasan_check_read+0x11/0x20 [ 400.829319] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.834611] __should_failslab+0x124/0x180 [ 400.838860] should_failslab+0x9/0x14 [ 400.842674] kmem_cache_alloc+0x47/0x730 [ 400.846752] ? __nf_conntrack_find_get.part.44+0x1105/0x1cf0 [ 400.852563] __nf_conntrack_alloc+0x1aa/0x7c0 [ 400.857083] ? early_drop+0xc40/0xc40 [ 400.860893] ? __local_bh_enable_ip+0x160/0x260 [ 400.865571] ? __local_bh_enable_ip+0x160/0x260 [ 400.870251] ? lockdep_hardirqs_on+0x296/0x5b0 [ 400.874849] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 400.880065] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 400.885621] init_conntrack.isra.47+0xff6/0x13c0 [ 400.885638] ? __lock_acquire+0x62f/0x4c20 [ 400.885656] ? rt_add_uncached_list+0x1e1/0x280 [ 400.885676] ? nf_conntrack_alloc+0x50/0x50 [ 400.885694] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 400.885716] ? lock_acquire+0x1ed/0x520 [ 400.894699] ? nf_conntrack_in+0x5de/0x13b0 [ 400.894718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.894739] ? check_preemption_disabled+0x48/0x280 [ 400.894763] ? kasan_check_read+0x11/0x20 [ 400.894783] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.937142] ? trace_hardirqs_off_caller+0x310/0x310 [ 400.942247] nf_conntrack_in+0xc7d/0x13b0 [ 400.946393] ? nf_conntrack_update+0xbc0/0xbc0 [ 400.950973] ? __do_replace+0xab0/0xab0 [ 400.954934] ? zap_class+0x640/0x640 [ 400.958638] ? lock_acquire+0x130/0x520 [ 400.962631] ? nf_ct_l4proto_unregister_sysctl.isra.16+0x130/0x130 [ 400.968973] ipv4_conntrack_local+0x16a/0x220 [ 400.973486] nf_hook_slow+0xc2/0x1c0 [ 400.977212] __ip_local_out+0x56e/0xb30 [ 400.981176] ? ip_finish_output+0xfa0/0xfa0 [ 400.985498] ? __ip_flush_pending_frames.isra.44+0x2d0/0x2d0 [ 400.991320] ? __ip_select_ident+0x16d/0x2a0 [ 400.995733] ? ip_idents_reserve+0x320/0x320 [ 401.000150] ip_local_out+0x2d/0x1b0 [ 401.003869] iptunnel_xmit+0x56a/0x8d0 [ 401.007752] ip_tunnel_xmit+0x15b8/0x3c04 [ 401.011897] ? ip_tunnel_init_net+0xac0/0xac0 [ 401.016385] ? __sanitizer_cov_trace_pc+0x46/0x50 [ 401.021227] ? kasan_check_write+0x14/0x20 [ 401.025449] ? pskb_expand_head+0x6b3/0x10f0 [ 401.029850] ? mark_held_locks+0x130/0x130 [ 401.034071] ? mark_held_locks+0x130/0x130 [ 401.038315] ? skb_release_data+0x880/0x880 [ 401.042637] ? mark_held_locks+0x130/0x130 [ 401.046884] ? mark_held_locks+0x130/0x130 [ 401.051118] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 401.056658] __gre_xmit+0x5e1/0x980 [ 401.060281] ipgre_xmit+0x3e7/0xba0 [ 401.063900] ? gre_tap_xmit+0x590/0x590 [ 401.067879] ? __lock_is_held+0xb5/0x140 [ 401.071956] dev_hard_start_xmit+0x295/0xc80 [ 401.076359] ? dev_direct_xmit+0x6b0/0x6b0 [ 401.080584] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 401.086121] ? netif_skb_features+0x690/0xb70 [ 401.090607] ? rcu_softirq_qs+0x20/0x20 [ 401.094585] ? validate_xmit_xfrm+0x1ef/0xda0 [ 401.099106] ? validate_xmit_skb+0x80c/0xf30 [ 401.103532] ? netif_skb_features+0xb70/0xb70 [ 401.108057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.113613] ? check_preemption_disabled+0x48/0x280 [ 401.118649] ? check_preemption_disabled+0x48/0x280 [ 401.123662] __dev_queue_xmit+0x2f71/0x3ad0 [ 401.128007] ? save_stack+0x43/0xd0 [ 401.131645] ? kasan_kmalloc+0xc7/0xe0 [ 401.135556] ? __kmalloc_node_track_caller+0x50/0x70 [ 401.140677] ? netdev_pick_tx+0x310/0x310 [ 401.144855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.150404] ? check_preemption_disabled+0x48/0x280 [ 401.155435] ? __lock_is_held+0xb5/0x140 [ 401.159496] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 401.164502] ? skb_release_data+0x1c4/0x880 [ 401.168836] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 401.174118] ? kasan_unpoison_shadow+0x35/0x50 [ 401.178688] ? skb_tx_error+0x2f0/0x2f0 [ 401.182652] ? __kmalloc_node_track_caller+0x50/0x70 [ 401.187748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.193289] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 401.198842] ? kasan_check_write+0x14/0x20 [ 401.203086] ? pskb_expand_head+0x6b3/0x10f0 [ 401.207511] ? skb_release_data+0x880/0x880 [ 401.211839] ? __alloc_skb+0x770/0x770 [ 401.215743] ? __lock_is_held+0xb5/0x140 [ 401.219825] ? kasan_check_write+0x14/0x20 [ 401.224081] ? __skb_clone+0x6c7/0xa00 [ 401.227979] ? __copy_skb_header+0x6b0/0x6b0 [ 401.232397] ? kmem_cache_alloc+0x33a/0x730 [ 401.236742] ? skb_ensure_writable+0x15e/0x640 [ 401.241348] dev_queue_xmit+0x17/0x20 [ 401.245160] ? dev_queue_xmit+0x17/0x20 [ 401.249167] __bpf_redirect+0x5cf/0xb20 [ 401.253163] bpf_clone_redirect+0x2f6/0x490 [ 401.257505] bpf_prog_e2ed69a7d397132f+0x94b/0x1000 [ 401.262532] ? bpf_test_run+0x175/0x780 [ 401.266514] ? lock_downgrade+0x900/0x900 [ 401.270665] ? ktime_get+0x332/0x400 [ 401.274393] ? find_held_lock+0x36/0x1c0 [ 401.278465] ? lock_acquire+0x1ed/0x520 [ 401.282447] ? bpf_test_run+0x3cb/0x780 [ 401.286426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.291972] ? check_preemption_disabled+0x48/0x280 [ 401.297005] ? kasan_check_read+0x11/0x20 [ 401.301171] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 401.306451] ? rcu_softirq_qs+0x20/0x20 [ 401.310426] ? bpf_cgroup_storage_release+0x220/0x220 [ 401.315622] ? skb_try_coalesce+0x1b70/0x1b70 [ 401.320133] ? bpf_test_run+0x25d/0x780 [ 401.324120] ? netlink_diag_dump+0x2a0/0x2a0 [ 401.328541] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.334085] ? bpf_test_init.isra.10+0x70/0x100 [ 401.338767] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 401.343540] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 401.348388] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 401.353936] ? fput+0x130/0x1a0 [ 401.357223] ? __bpf_prog_get+0x9b/0x290 [ 401.361295] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 401.366138] ? bpf_prog_test_run+0x130/0x1a0 [ 401.370556] ? __x64_sys_bpf+0x3d8/0x520 [ 401.374618] ? bpf_prog_get+0x20/0x20 [ 401.378453] ? do_syscall_64+0x1b9/0x820 [ 401.382519] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 401.387890] ? syscall_return_slowpath+0x5e0/0x5e0 [ 401.392826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 401.397675] ? trace_hardirqs_on_caller+0x310/0x310 [ 401.402698] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 401.407719] ? prepare_exit_to_usermode+0x291/0x3b0 [ 401.412745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 401.417599] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:39 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f00000031c0)={&(0x7f0000002c40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003080)=[{&(0x7f0000002cc0)=""/221, 0xdd}, {&(0x7f0000002dc0)=""/137, 0x89}, {&(0x7f0000002e80)=""/160, 0xa0}, {&(0x7f0000002f40)=""/165, 0xa5}, {&(0x7f0000003000)=""/123, 0x7b}], 0x5, &(0x7f0000003100)=""/136, 0x88, 0x81}, 0x2022) sendmsg(r0, &(0x7f0000004840)={&(0x7f0000003200)=@ll={0x11, 0xfd, r2, 0x1, 0x2, 0x6, @dev={[], 0x14}}, 0x80, &(0x7f00000045c0)=[{&(0x7f00000044c0)="48545b212a762122e48372300ff9a446a53980d718e9e187103a59960719c0cde9ea907bd262ba02699624863a6ca2f9d02d88a338c182238b2e4c8ebf5dc6374e0e709032daaf15aee1c5714e1393988c7c95108bdb711e4e5bdb1f770423e4e55e2b754674bd5e0f3a767585713ef061fd6816edea98435646e4228604dc203f9fc4cccc058b457ceb7e022a6743af2687a79e0a8713629debf4652c4a4821c69a485496f8a95d9e71c9acc360ff5c11a36ef6d06f77411b25142fd8780734c079daf8b4ba5284a41ec2d5c536eb7fabf9e4bf77520547728fbb09f9f717", 0xdf}], 0x1, &(0x7f0000004640)=ANY=[], 0x0, 0x10}, 0x8000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='memory.swap.current\x00', 0x2761, 0x0) openat$cgroup_procs(r3, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e2f6367726f75702e6e65742f2f797a310f", 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ipddp0\x00', 0x100}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={0xffffffffffffffff, r3}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0), 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYRES64=r1], 0x3d04) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000240)='./file0\x00', 0x0, 0x8}, 0x10) 12:06:39 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00fffffffe0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:39 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000140)='(-keyring\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='.\x00\x00z\t\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x80000001) close(r1) openat$cgroup_ro(r1, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:39 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x657, 0xfeffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:39 executing program 2 (fault-call:3 fault-nth:21): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000300), 0xfffffffffffffff8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)=0x4, 0x800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="bf7c8fc46119a46cc51c2fc47e41e53fbb197d8a1989e674c3b64dc8aecaa8b15f16676765b66a217906394003de017eeaa1b912070b49223fa17f3b5bf4a82f697c6dbdff85c46898cd247f10db863a2393ffeb58e514bddb40700a0190150be95ea51da59a6cc07769de4a1c0cbd6b57d000cf320baf0000000000000000"], 0x200600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x3e6) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000480)='bdev\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0x2, 0x5, 0x5, 0x0, 0x98a2, 0x0, 0xd, 0x6, 0xffffffff, 0x7, 0xffffffffffffffff, 0x7, 0x7ff, 0x3, 0xa40, 0x9, 0x41, 0x0, 0x40, 0x1, 0x480, 0x3ff, 0x8, 0x5d3, 0x1, 0x1, 0x3, 0x4, 0x200, 0x80000000, 0x7f, 0x6, 0x716215e1, 0x1, 0x6, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000100), 0x8}, 0x221, 0x8, 0x34b4, 0x6, 0x8, 0x7, 0x2}, r3, 0xc, r0, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r0, 0x0, 0x5, &(0x7f0000000040)='bdev\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r4, 0x4) openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x9, 0x3e3f800000, 0xffff, 0x200, 0x0, 0x401, 0x200, 0x2, 0xffffffffffffff00, 0x7fff, 0x8, 0x2, 0x4, 0x10000, 0x80000, 0x400, 0x6, 0xffffffffffff0001, 0xbf5, 0x53, 0x80, 0x5322, 0x1, 0x3, 0xfffffffffffffffd, 0x13d5, 0x6, 0x2, 0x5, 0x8, 0xb37, 0x1f, 0x5, 0x3f, 0x992f, 0xd, 0x0, 0x9, 0x1, @perf_config_ext={0x16c1, 0x3}, 0x400, 0xce76, 0x6, 0x7, 0x9, 0x5, 0x5}, 0xffffffffffffffff, 0xb, r1, 0x8) [ 401.695160] FAULT_INJECTION: forcing a failure. [ 401.695160] name failslab, interval 1, probability 0, space 0, times 0 [ 401.706535] CPU: 0 PID: 23647 Comm: syz-executor2 Not tainted 4.20.0-rc1+ #81 [ 401.713816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.723174] Call Trace: [ 401.725785] dump_stack+0x244/0x39d [ 401.729444] ? dump_stack_print_info.cold.1+0x20/0x20 [ 401.734658] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.740220] should_fail.cold.4+0xa/0x17 [ 401.744296] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 401.749419] ? __perf_event_task_sched_out+0x33a/0x1bf0 [ 401.754801] ? pick_next_task_fair+0xa05/0x1b30 [ 401.759485] ? rcu_read_lock_sched_held+0x14f/0x180 [ 401.764518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.770075] ? print_usage_bug+0xc0/0xc0 [ 401.774148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.779695] ? __perf_event_task_sched_in+0x2a9/0xb60 [ 401.784910] ? __lock_acquire+0x62f/0x4c20 [ 401.789162] ? finish_task_switch+0x1f4/0x910 [ 401.793667] ? _raw_spin_unlock_irq+0x27/0x80 [ 401.798165] ? _raw_spin_unlock_irq+0x27/0x80 [ 401.802677] __should_failslab+0x124/0x180 [ 401.806931] should_failslab+0x9/0x14 [ 401.810746] kmem_cache_alloc+0x47/0x730 [ 401.814822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.820383] skb_clone+0x1bb/0x500 [ 401.823934] ? finish_task_switch+0x1b4/0x910 [ 401.828438] ? skb_split+0x11e0/0x11e0 [ 401.832343] ? preempt_notifier_register+0x200/0x200 [ 401.837456] ? __switch_to_asm+0x34/0x70 [ 401.841526] ? __switch_to_asm+0x34/0x70 [ 401.845599] ? __switch_to_asm+0x40/0x70 [ 401.849665] ? __switch_to_asm+0x34/0x70 [ 401.853732] ? __switch_to_asm+0x40/0x70 [ 401.857804] ? __switch_to_asm+0x34/0x70 [ 401.861873] ? __switch_to_asm+0x40/0x70 [ 401.865941] ? __switch_to_asm+0x34/0x70 [ 401.870004] ? __switch_to_asm+0x34/0x70 [ 401.874072] ? __switch_to_asm+0x40/0x70 [ 401.878130] ? __switch_to_asm+0x34/0x70 [ 401.882200] bpf_clone_redirect+0xb9/0x490 [ 401.886452] ? __schedule+0x8d7/0x21d0 [ 401.890351] bpf_prog_e2ed69a7d397132f+0x805/0x1000 [ 401.895376] ? __sched_text_start+0x8/0x8 [ 401.899531] ? lock_downgrade+0x900/0x900 [ 401.903695] ? find_held_lock+0x36/0x1c0 [ 401.907766] ? lock_acquire+0x1ed/0x520 [ 401.911744] ? bpf_test_run+0x3cb/0x780 [ 401.915720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.921266] ? check_preemption_disabled+0x48/0x280 [ 401.926295] ? kasan_check_read+0x11/0x20 [ 401.930454] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 401.935735] ? rcu_softirq_qs+0x20/0x20 [ 401.939714] ? preempt_schedule+0x4d/0x60 [ 401.943884] ? ___preempt_schedule+0x16/0x18 [ 401.948312] ? bpf_test_run+0x25d/0x780 [ 401.952310] ? netlink_diag_dump+0x2a0/0x2a0 [ 401.956725] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.962267] ? bpf_test_init.isra.10+0x70/0x100 [ 401.966942] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 401.971714] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 401.976558] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 401.982101] ? fput+0x130/0x1a0 [ 401.985384] ? __bpf_prog_get+0x9b/0x290 [ 401.989450] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 401.994294] ? bpf_prog_test_run+0x130/0x1a0 [ 401.998713] ? __x64_sys_bpf+0x3d8/0x520 [ 402.002777] ? bpf_prog_get+0x20/0x20 [ 402.006596] ? do_syscall_64+0x1b9/0x820 [ 402.010662] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 402.016030] ? syscall_return_slowpath+0x5e0/0x5e0 [ 402.020971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 402.025817] ? trace_hardirqs_on_caller+0x310/0x310 [ 402.030853] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 402.035876] ? prepare_exit_to_usermode+0x291/0x3b0 [ 402.040899] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:06:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x0, 0x80000, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) 12:06:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r0, 0x50, &(0x7f0000000180)}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 402.045754] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:06:40 executing program 2 (fault-call:3 fault-nth:22): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:40 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000020000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) socketpair(0x11, 0xa, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00memory - +rdma /rdma /io -cpu \x00\x00'], 0x21) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x2) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000300), 0xfffffffffffffff8) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)=0x4, 0x800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="bf7c8fc46119a46cc51c2fc47e41e53fbb197d8a1989e674c3b64dc8aecaa8b15f16676765b66a217906394003de017eeaa1b912070b49223fa17f3b5bf4a82f697c6dbdff85c46898cd247f10db863a2393ffeb58e514bddb40700a0190150be95ea51da59a6cc07769de4a1c0cbd6b57d000cf320baf0000000000000000"], 0x200600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x3e6) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, r1, 0x0, 0x5, &(0x7f0000000480)='bdev\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x4, 0x2, 0x5, 0x5, 0x0, 0x98a2, 0x0, 0xd, 0x6, 0xffffffff, 0x7, 0xffffffffffffffff, 0x7, 0x7ff, 0x3, 0xa40, 0x9, 0x41, 0x0, 0x40, 0x1, 0x480, 0x3ff, 0x8, 0x5d3, 0x1, 0x1, 0x3, 0x4, 0x200, 0x80000000, 0x7f, 0x6, 0x716215e1, 0x1, 0x6, 0x0, 0x6, 0x1, @perf_bp={&(0x7f0000000100), 0x8}, 0x221, 0x8, 0x34b4, 0x6, 0x8, 0x7, 0x2}, r3, 0xc, r0, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r0, 0x0, 0x5, &(0x7f0000000040)='bdev\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r4, 0x4) openat$cgroup_ro(r2, &(0x7f0000000300)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x9, 0x3e3f800000, 0xffff, 0x200, 0x0, 0x401, 0x200, 0x2, 0xffffffffffffff00, 0x7fff, 0x8, 0x2, 0x4, 0x10000, 0x80000, 0x400, 0x6, 0xffffffffffff0001, 0xbf5, 0x53, 0x80, 0x5322, 0x1, 0x3, 0xfffffffffffffffd, 0x13d5, 0x6, 0x2, 0x5, 0x8, 0xb37, 0x1f, 0x5, 0x3f, 0x992f, 0xd, 0x0, 0x9, 0x1, @perf_config_ext={0x16c1, 0x3}, 0x400, 0xce76, 0x6, 0x7, 0x9, 0x5, 0x5}, 0xffffffffffffffff, 0xb, r1, 0x8) 12:06:40 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)="637075d4d63033616363742e7573614b1ab06ef1f76667655f", 0x0, 0x0) close(r2) 12:06:40 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000f000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:40 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:40 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:40 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000080)=""/14, 0xe}, {&(0x7f00000000c0)=""/137, 0x89}, {&(0x7f0000000180)=""/168, 0xa8}, {&(0x7f0000000240)=""/31, 0x1f}, {&(0x7f00000002c0)=""/50, 0x32}], 0x5, &(0x7f0000000380)=""/159, 0x9f, 0x8000}, 0x20) sendmsg$kcm(r0, &(0x7f0000001ac0)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0xf453, @dev={0xfe, 0x80, [], 0xa}, 0xa07}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000000540)="619a2964a7b81642f989b9ed2951ea14a4d928e33f05049fde44eb4b21af87802763524d90e70a1b41b6b8e52d84e4589a935918d7a266fec40de841fcc788f8511a7178f2ca62b33311340a8ee648838df3864f13f2b8f540df5715b6a0e76e11b2b4ae204fe1bfca4197e7b427e8a9e5fde9fdf4f9167d000ee34663420525bad8d56fc96d26b2df4dccd47b500b1f52c63e263ebc84ec7c7dedd96df8f53583ae43ee58c57ce266ab7939ea060188c6b7458204", 0xb5}, {&(0x7f0000000600)="24997ff249758cdb3095d0f9611fa417", 0x10}, {&(0x7f0000000640)="09cff7a014168a95715aeda856f326b7b0bb678c753ebe477e59fcf84c24231426fe426890802342e88b67a2ce5de2a97a25e01092be17a1ed1312959ba2f3a4f950f78019430e7acd1c75c030fa8f8f7f4fde42b2a3220d09f16ffefb3f36c39cde5b96e4ad700f31e87f3eefe618881bcdf0eb565dd64ed1d04d66f2e15b333a8e8fbff2c5f2dc2c79c9d81afae0fb244be82e4678bf457fe2794e9d020036253b1d8e78579da425eca81e74561c0e867470b71a45a4f502ddd7a1a61a7dee7a09dd523b5878b123476317517226256554501457f443c3c977ce46fa22172e5480d92ba66b472dd9bd118575560ebea00404ffcb7f51e0be5e26bcb1c50080543a70aba049089118a003226aa972436229966452956088e0eb45d81038e3350a884b4fcff8b5ae2eb11ed6e75a063d1a5854fd705903a068676e3b633f919d33cbf91c13f0def8a15c22ef3b24001d4d809d17878e76e53d59bc449f362be2c036555f6dd1881f381cbdda064bbbd6894218132df9c5eacb101c7a99462798956ae4d3466b7d0f672a51a560ea653129254744208cef5783e4900bd2a3b4ce257536fcd31fa0a28584e6182ce1ee4c57d5c39eb5dba9ea340cf6c3602b0f013b0a59c952ae9ebdcca444d565b303beeb4291d5a355c9f1a4eda9174a62a630b44b9dd4a24b7b92d7bc2fc487da7a2ce4f567473c591ff64e299ed150b7edf572c7edaee4c8684fd5b874a4bdc0a846e396409666781e775a86c6b501b77646beb334b6b719d487c79d6f31558e25bca2027d80d37d3ca306f42e003d93d33f27215adcc4279e86a518b37f5ffcbe83e6a957d54ca8c0d75ac10139b2973509ed4421b22d1223e7402b011238c6eddb9e27c3ca9e2c19067935150aff295fe2d5ccaba993513cad7632b3ebd77bf0a2be757a76925e0d6a237ac0ec48548e5f8221a561882e06bc73f9a5c0066233341d03b8e8a0f52da994f483e25862a58a2ab26ba84c26ebdbd3b34be5a979b42acf2bf6b02628fd708d1a0b36b6c0e63d4d7b01839b9532f66b6dc6c3112a5ecb7c9c7ae34c6190fa74510accc68810a0680283e09edafd45e2f64812276cc5746ae37e08f388bd6a2cac591bbe3aae2350c0e87beede2a41bebd9d172727dddc9b0fc78baafadd9dfe96e36a546cbc7a3c7b2e24eb1bab15601879a3574c5173442c20255c16085de4cbd56544607d13be5754f81e5539d9775ee46ce324da983283a974478e9a04d28503114b1bfbf863e97693c353da47b8970bfc6405677a3b29c91c0296f1a515e46e162a6919236db7928e667056afc6456afb114872dbe020382cf0ff1444162f3d45f73145f46b736325ba281565c651ce8a2d14392ecd43c699a21111b7ebef2ee42cd1124994b3ff3c1ba338649adebf6c201cf2106395c022108aecb6dbfb799967c6f98340b2994d02ec03157f5b6a37aeb4d468752ca139bb48c53252d8baa93e366e017fc4acd0b691458a0f7182becec2f99a65e2968cd1b8cfce2f67d4e779ce58912838e36ad6268db55a2e5a6b45ce99a06fa4c36b7e0b11fa3ffee9c95b4541c43b32db04eec466de1558709225eda760aaffedba713dcc935f3e13e5245a6b994c6739608d1c1562a142b6599f70d79dfbe1694a10fff6e13be698499038458f9b96068e44a11d96bec964ce13e9ed00cdc58dde362748b170c87e1c9347515f2001d2663e13e6546f1742750be40ce31b2f3d0151d32f8e9adc5cceb38df70ffa79ec5aeadebf87ea9edb06601d73d0bf0f2a929a290d5bdf5bcb07c0af7b753109f7485117465faf80bb7ffc9bfb1787f99b39432f96980a033dc39a533ffe1be1d4ed60a72398e69dbe6422f2613d2c7574d3f9b402d3a41aa7387fb5ff46156766312104ae3a3bf62be612d899d42da31b30cb6721020665fb21f3566f02a3f38462457c50f3f18711113620b9aca7ba3ace8dab2f938b6e742ecdd411f821937adc999b7f8b51fc553b0d013707a814f3e45b6ab913f885ad0ac55ceb141929065565bc1557f9b589f095e1ab8abbbcbc62a54dfe0162932ea82e90fdac5721beab337000c00f543462406ee084e2c9761af4d917b9d973298d9106dd70cc92c201542c1ae726a6d9c0d31b073338c495eff1dc83d46c58b5066f7941e188519d9002f1d8d4a04957dd50338b5b956a36e748655b5d8fedc5b2b1428f668aea1e556259955dead98d6bd7d4820c42e27a77ff715f0f881481ea35353cf5f02cb2907631189cb26387c75571c563dcd58977bc0eba8935b49093ad0b5bda86c7f01e1dcf7da15d719ca9d6c8bfe52e442d40aa0baea3ccab305048a4213970548af160d3353e040d2d42f1c66e76dab81f4c946869aef326e4cf0a66925f3f8c7eca0ae91f144252f0f2d95ffc5bb8dc95846177b65455e37ee535d7a5e7bc96c0aa260b2b145ad2265496d5f1a7ab45dc2fe9000360fe233a58bdac072cec1c2a03360a3bb9fc90ccc9fe68a4d85136dcd3004b0d56cdbfef69f919aaa3c93f52da900e73419dd027c8f05d790ea71530d4b74ba3489c1f65ea25a292ab5d68d174fa2ebaca74d263d097bd25ab95c8ec702891e7303946a741f9cfe37c852e3c6556bef949ae631ae108a905fb051bbe4db9848cf8f77e6b4776d0e6f76cd31eda8e026e6a09f1348c2fa822e2d32201344eb36787a49b3436fd15c7dbc603318ee7cea394408a0f5342a9e14eafe42784a562a6da59ab46adf8f00d83de41ea415042a2a5a51f0df6a7a43ac0025bbc49312ceb26793d74e4484861a04e3c3eda00b26ba7dc67f4b505ef834da1f6654e56559fb782ce01f328a7cd133a262175ca688b555c545f485af4b3b040df01866ef01e343ea99a9225e97dbd02588c428f15a3070b57af844aa5a3665f85a1f8278f0fd5d5cc795559ed0ad13066c16444b80bb29dd182a65806267575d382c54e12e8933e9e5ff4d6752ef23d57c9419c43790ed712077b5c00021c401b1e2e41d99366a2636a8a5b498a8d4da2abc13f91592d414e5bbb7b012c7c62a2bb6640ea60fd58cfa4e5cebf0fadcdf277638de410516031060c0b7f2209bd417a31ff46dd2ca8c17545887f9ed27a61749eb5beff593ee0739b1fbe54ea5967b8a64f0bccd85a35b2ba02027fc188f37ad918afcd489715e64aad082d90e47c7ce9e6af5537530db73c592628f4a12ce7c5228c94a3c4b011f2ba961ea8cb5a72b5de34177f7b412369aeed54f33cbea90c6f8e0460872f9b74f12244369a97dcedb9466af9ea8a3ce55bf08c60fd2030c70453a369a8fb20102b4a95b5160c95aa6448180ad6d72a3f52603213929fd7b8d08acbe4230a675e5d7a4e8029192bca8daa9946cdc67b009407a4cb5b93f5af3cb51b3037c92c5ae7d45732a37d77630ce2d9f64da639815d0dad8ae43317b695fab5d5cfbb9f3ca3f46aa475b962a0f574144a970772ffdbeefba838faa7d0eff9908b8fc3a37dee8e7ba4ed38af2e2342b6f7d7a928ea6c06b6c1bd774246a9bd75d6ca8ec2e26325e552e38927c88d803671e3cc4ce45f74e3f493160a64b7894395c26361fae53b74d7d9c9b08c28c966ed4f0b5d09e3c71afce9b59bc3f881d9bd9e8837cb0ee9ae564ff808db385ab47d9dfb13e4bd53c29373d872dd9f24ee4760de3f42d5df3d2d56626f871da30a2637aaef48b7f85dd0dc37826013f09d755e351f8433061073f2932645a9eebe098dbe9c8c47da3850d8b55bbae030b1a49e7d4bc6a5386d0451fc8c1d3e4c8af1fdb11e8547f2a6879864e2bb1c189576c7cf4d92878482225d66f966c87d8ef3732faf76b1d1e7a7fc3ffbffe36f83ec5c9e83cf00de0b3cc35628e8aa825f32eefa4dffc7791cc84799f9efbf7c70f7463365a3ec9882186379de833009bbcda56e7491a272d2b3455bedb5ac9ed197a3ead85863817da0350d470aab94b6ec5738a8e979840def394e67664a2722a4cec3a67dc838b17364a15bebcec45933f351433acd8daa364ac9d2218b05a34b938445c0ecebe3a60fefc2588cf45b4154181a9868fdd3df593e289114b247cfd6489da9dfd5a1282a4eed60942a7019b6829fce7187fa4c329c9f95d3ae4e453929338eae8c11d2e8b4a314014a299b2fdb62a7b731986a2582c49071e1b633ed1dc14acfdda7bc942e0f470334226b4ef10ea0f2ba9714c2351fc9f09462b2fdda8d0df1ff5110c0270988a97db551b3d89f18d6a5aa66d0b906659dc6b397fc1b5435d31eabbf46befd06d19872bd9e7fb4c3b09923664c7b2f737de5de8b8945aa17860c16486ca7fbe32ac1e8699f16eab4465f2ab69bddde37033b2046affbb59678f528fb28e97c8ba8001ef94ef7ad13837ef96feba6e804a9449a23c2b534a65fb3e08ec072925fa1c1778718e068a535cfdf77bd195479e2d08a1ea4b51200d3ddd5aca809cb505b7ba096da34528171fad18adec611e5e26ee70ea1ee4dadb71fde4a453a78d7f0882ceb404d0ef0e2711f84ab5a924238ef92897a6e1d3786f45fefcd940ae2337b08eddedc6678432cad83f3178e2238a1a981a16e7641a6032d8aa7e87bc9b7af9ef0719a67d5e8295029c61ce2eab85a2254cefe9f445043a9fc635cd744b128b7b0481ba09c2779a644242979191e670f3a8ceb113c4733bc81cd46e1f8f10cd951bb39bb5ce96db4138768a7de52adad450822e5eb92529ced0cc3c688ba636e0f40fcfa7d1094be6f9522d83b0718f8642cb39a99ac05975ce8c929190e641140923647d618326625e9ae273efe73591a72f038cc27b27015850524ff0e98bce2564d9f8c84e1cd0ffa106f16787d1f6e5981b11ab9236d352c3ab2e0a93ba1da60e5281b3a61562914175c03dd93d4bf70860dfadbc5182f746db31e379431e6a2940685355ad4b82df5261e947a4bdf367c86464de455d7d2e078234da8ba6004413ce8c9a14f6027477e4f7706f5d719a4291661f9fc38de6930e335e1f6512f31a65676e9aece7e27ec4826675ca4ce09656f79ce363b7234707d4e41d25d2c9b8b04f6df487eb6ed10d28c53bed62c4946ad5b3a7e753b91f0505b08fe601ea73abc913cb86da71329644f6dfa6a2a9431ce9bbb54052e9228aad47ad596e4e1774b33cf6ce4d8183ca7ffecf09a853d4ecde32f7ad3cde49151ffe6ddf8315ca47f2c51680bf2633c273a2ede6bdd0ce41782adddf5f9779b181797776e6507943599b29259dc143f5b24445f6390948b88cf1af0169ba677fdc5551beca0d92b43cabb3dd549c8e795eec2b2d69cb595da630b077cc2f94681993411251389fdf7401f6f349ee4c65a9135b75c4e52eef308a8ec959b9f1f6ed7a3f2352427950b88817da79371ab69d3c76b70bf4c682c4bd5d87b63880a20c42e553b813481a89c26522a520157a81ef7c374cba2dd32082469f06731b6c8812a432f71941e2ed7ac6444911e7ca9ab7d5dcc5fbdec8b003a381cc97f57da8d061e4285ca3159484200782ea8ac4611e4b56282f61dbe7fef50392ab9102eb3d83eabd44199373b9743023b74c3e4ffad2be51b174837d1c83f75cfb8ecf78ba83d1e68d789f4ab401d7217d1b2a3310ffca42200a1403a300f7b22062e4dc03584f29ad86aa4ba3540d9c5c3e475711e708ddcd8a552f53bd1c2db6dc8f52eaba408233b411abc311b028d320fbfffb9a36ba7c5a3b61aae559b6e51c46f9633101741776d29555ed100acf7a3fc02ab6362bc322271d1a0b0f1154690e3fe04ad0e05c6d29e87208e06", 0x1000}, {&(0x7f0000001640)="9f9b0f0d8bb7077acf8cf2fe250aca24a451d857c7b5088ba6d457849137e5802ece76025dd49aab8027d3e443aec202b18aa1ce8cfe05146274ae09b744b6c77d42e9abec4beb39aa287e7d73ad9e25fa88e441e1fd0dfb139ec76e06263b8c9d8272af6bf41aeef572ba0c7f942cc51eedfd0d498d55d3d9748a35e688f81c3b65851367b39aa625af00454b05407b871e07a6e086994cd40fa614e7935fad2d3ab0d00a2fe8", 0xa7}, {&(0x7f0000001700)="34090dbd5715e45b4f17a1ea8158d1a35e47c326189402230d1782150752c4c799261479294b2656772709723bfa3c69ad0731b0adace8b4f696a0acccff3c4445756da623f569521d97043be775ed2c0e76f9b9fcdc7fa5b0da49c39aa136a98e9c5000b70b40d3ac352115b4ffbbeefb269d09d125b6d90835a619a4fc934ec0ed1f31565458d1c0ac268569a53301a57a77b45a2cd578f6118ed966325f374d2a6d404ed68bac97252d20cd93d6d17aa8d074044744f24b580d84da40033808b7d638dd030dc8c6a120ff1349c5a1d6fe9e9d", 0xd4}, {&(0x7f0000001800)="9c4aca6c0779e1d414ada6ff66e0d3a94283c89931e5f3ee67b07973f3b1878d6bd36929d7a358cbc45fe03fa1a48d6105785ca54bc920e1e517374481803b1491873532b832b9299ae2d4167c120f20ab612c7f5a9efbfe04e40c3ee52bcd7c36521b4a0a137c356d78282a37defb6d", 0x70}, {&(0x7f0000001880)="31781671b972841f3a308b996688c2aa74dce1396b28fed1516681f10b2a4ab9fe8505b45d67c4902a830f770bf97717dce7b86b1a6a439795eecd40bbe9e920761d87cd52f120c19916d453570335226858a8db77d3b29690bd443d2ada26051754ac05b97fc5549cf7e7ed719bb923dc359b9c20c8d09fb39b99a8991d4a120e160f81145bbc99eebcb90bd183ca2476baaa937099851aac609fc260126bd7c8711bdc56831e64eab52d5e1593ed6f13846b8f1b6de523261219ac0f71adb56737d2b7f6923366077a2d4110d3b4e351bf3abf929bf196cb71469f29119fd1c2888c0c2db4d0c9", 0xe8}, {&(0x7f0000001980)="4e74a5bfc8e01a00c3abfe4a30117e61b2eb83dc33a1e356e88bdb8260bc89e50c351eef4318191e6445ee7b92dd92456ff4b59f6394f635b2ddca6fc1f769fb84151841cccf05d8c97cf68ed80a54cf35cd8221818917e2f5d4c7717548439bb6f5b1808acc431cc41298678d67bd0c3ea5749b395e4fcd95088549ab508c9ac3e3dbb470c8b1f5e3af471c1654540328c11ed0da38913457", 0x99}], 0x8, 0x0, 0x0, 0x80}, 0x4000000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0x8}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r1, &(0x7f0000000000), &(0x7f0000000240)}, 0x20) 12:06:40 executing program 1: socketpair(0x4, 0xa, 0x3, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xe}, 0xfe8f) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=""/42, 0x2a, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)={r1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='cgroup.stat\x00', r3}, 0x10) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0xfffffffffffffffe) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000000c0)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x2006, 0x209e1e, 0xfffffffffffffffc, 0x1, 0xffffffffffffff9c, 0x800}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r4, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r4, &(0x7f0000000000), &(0x7f0000000140)=""/130}, 0x18) 12:06:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'eql\x00', 0x600}) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:40 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000700000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:40 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, r1, 0x8, 0x1}, 0x10) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00001800000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f00fe070101000000000063dac37b7403242189c609", 0x23}], 0x1, &(0x7f0000000080)}, 0x0) socket$kcm(0x29, 0x2, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000200)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0xfffffffffffffc87, &(0x7f0000000140), 0x23d, &(0x7f0000000280)=""/138, 0x6b, 0xff}, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 12:06:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:41 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffff0000}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f0000000180), 0x127) 12:06:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = gettid() r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000280)) socketpair(0x0, 0x80f, 0xa0c, &(0x7f0000000080)={0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r3, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000002c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x28, &(0x7f00000001c0)}, 0x10) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x11, 0x3, 0x400, &(0x7f0000000180)) openat$cgroup_ro(r0, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) 12:06:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000a00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r1, 0x2, 0x10}, 0xc) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x22, &(0x7f0000000000)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) recvmsg$kcm(r3, &(0x7f00000002c0)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/13, 0xd}, {&(0x7f0000000200)=""/100, 0x64}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x7}, 0x0) 12:06:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00003000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) getpid() openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:41 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x25}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x201a7f1b, 0x85ffffff, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}]}, &(0x7f0000000140)="47504cc000", 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r1 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff7) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0xfffffffffffffffb, 0x5, 0x4, 0x0, 0x20, 0x80000, 0x1, 0xe6800000000, 0x0, 0x0, 0x3, 0x6, 0xfffffffffffffff7, 0x3, 0x1ff, 0x6, 0x0, 0x6d94b3f5, 0x80000001, 0x9, 0x7f, 0x0, 0x7, 0x9, 0x5, 0x0, 0x0, 0x0, 0x100000000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, r1, 0xa, r0, 0x3) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) perf_event_open(&(0x7f0000000240)={0x5, 0x70, 0x100000000, 0x3, 0x1, 0x20, 0x0, 0x7f4, 0x2, 0x8, 0x1000, 0x1400, 0x10000, 0xfffffffffffffffe, 0x2000000000, 0x4, 0x8001, 0x3, 0x4, 0x2, 0x6, 0x0, 0x100000000, 0x1ff, 0x2, 0x5, 0x5e, 0xffffffffffffffc1, 0x7fffffff, 0xfffffffffffffff9, 0x7, 0x1, 0x2, 0x9, 0x100000001, 0x0, 0x3ff, 0x382, 0x0, 0xffffffffffffff48, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x10000, 0x2, 0xffffffffffffff3f, 0x1, 0x800, 0x2}, 0xffffffffffffffff, 0x6, r0, 0xb) 12:06:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r0 = socket$kcm(0xa, 0x40122000000003, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x0, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d82, [], 0x0, 0xf}, 0x48) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0)=r1, 0x4) socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f0000000740)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x1000005, 0x0, 0x1}, 0x127) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000680), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)=@generic={0xc, "ddf95228adcb80d455a64ea96b388c597669d14253d4c01472089f2cfd33ee18601957bc7a0ee267debd46825d7baa4d9ff4e47649ba1ba27857ff311486d58cb08b2eb1bed032bbb59941c2626fde700c63a1aa80847916e8d614a8e84b706c2aff16592e209b8b80a7e685e9f9d3aaa59d695e36cb12585ccbda1b29d8"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="c0010000000000001f01000002000000b9100abd9ffe853624a1cfba4e436ff1fff968d0a5844e437f76724edaaf16abcdc4487ee2ab14c349ade352ac5ad5d36584e515a978e459da02f63afa4280eab13da1df5f9bf5669065b1cd7b838e02887fc77cadfa8fdfea5208b70b3a4e81e6c5098324b62a5435b3e9c38f08aac85d3797413ea4944a6b9f38a741d2f78b1f9993d6dae63cdcb143576c6847678587251400b00f53052f9fa36b0ec27dbe4085ec2c9e852935238845238d2100358b33f570e0b704000001000000002310a1a16154339487702d456b5de4ba68589dc9bd512c4b8f9c96e3b6edcbafe73097660e8cc887ee045de14dd12147e9dd03f026be2987d97c1a1933747301489d2bb2ee01ff0ece312290ffcb9637cfd4fb188729b5dd79552a952472779f8a72d6bccf33fa7d65f4c0e442f890e8f766fff9bf6c6c48414240ec6b8c10339496c643b1acf863e9ab8b04e1d23d67fdf7004778071913d17968b0c3a8f7079cf23bf9ca564bb9bab7a773c1220ca3aca460909e641d7e01faf752d0318adf0986a2e3b6471419bcd1c83630374f5fa2558c38849e0b1bdec7cdcd29d1588edc615f5b471c41ae7a936abd099e6a418a663a486c421a4cfaf21d56bb7070765790ac0811c971184f14c63c77a4592c69c9c457c7c4747de3b649edd64d3f402a4f5ff5bf15450443a958f00b4642abde0a9be16ccd0382d8951c507f5cb9a7bcd14f8ac8c114cbc07d8d42addf1bc17acecde9e9d828747b"], 0x1a5}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, &(0x7f0000000f80), 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x40000102) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) socket$kcm(0xa, 0x0, 0x11) perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0xffffffffffffff74, 0x7fffffff, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x1, 0x3, 0x0, 0x0, 0x2, 0x9, 0x0, 0x0, 0x0, 0xa520, 0xffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0xbca7, 0x7, 0x80000001, 0x0, 0x7fffffff, 0x0, 0x5, 0x2, 0x3, 0x1c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b4, 0xc2, 0x101, 0x0, 0x7, 0x0, 0x20, 0x0, 0x8, 0x7, 0x7000000000000000, 0x4, 0x0, 0x3, 0x2, 0x0, 0x7fff, 0xffffffff, 0x0, 0xa05, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x2040, 0x0, 0x9, 0x0, 0x0, 0xab}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1b, 0x6, 0x9, &(0x7f00000000c0)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9644a2c00d2970403dc0d") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000003c0), 0x2e1) 12:06:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00070000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x8, 0x101, 0x291e, 0x9, 0x0, 0x3, 0x4, 0x0, 0x0, 0x20, 0x1, 0xffffffff, 0x5, 0xffff, 0x10000, 0x7f, 0x20, 0xfffffffffffffffa, 0x1, 0x6, 0x9, 0x899, 0x4, 0x5, 0x4, 0x8, 0x8, 0xdab, 0x400, 0x0, 0x3, 0x9, 0x24, 0xfffffffffffffff7, 0xffffffff, 0x0, 0x0, 0x7fa, 0x2, @perf_config_ext={0x9, 0x9}, 0x1, 0x10000, 0x6, 0x0, 0x9, 0x3f, 0xdb4}, r1, 0x2, 0xffffffffffffffff, 0x0) socketpair(0x1a, 0x0, 0x7f, &(0x7f0000000280)={0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='&\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) socketpair(0x4, 0x800, 0x80000000, &(0x7f0000000340)) socketpair(0xf, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='-&*$^em0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x81, 0x0, 0x0, 0x20, 0x0, 0x7fff, 0x10000, 0xa, 0x7fff, 0x9, 0x7f, 0x3, 0x80a2, 0x2, 0x4, 0x100000000, 0x7, 0x2, 0x80000000, 0xdb6, 0x2, 0x2, 0xfffffffffffeffff, 0x100, 0x3, 0xffffffff, 0x6, 0x528, 0x7, 0xffff, 0x10000, 0x8, 0x7, 0xfff, 0x80000001, 0x0, 0x0, 0x1cb100000000000, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x2000, 0x4, 0x800, 0x5, 0x3, 0x3}, r1, 0x10, 0xffffffffffffffff, 0x0) 12:06:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) r1 = bpf$MAP_CREATE(0x6, &(0x7f0000000000), 0x2c3578d78ef0e284) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0xb, &(0x7f0000000040)=@raw=[@call={0x85, 0x0, 0x0, 0x30}, @call={0x85, 0x0, 0x0, 0x2b}, @generic={0x7f, 0x46e, 0x6fd99d54, 0x1, 0x7}, @generic={0x0, 0x5517, 0x7f, 0x3, 0x3}, @generic={0x7e, 0x80000000, 0x80, 0x5, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x1f}, @call={0x85, 0x0, 0x0, 0x10}, @map={0x18, 0x2, 0x1, 0x0, r1}, @initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xace7}], &(0x7f00000000c0)='GPL\x00', 0x8, 0x4e, &(0x7f0000000100)=""/78, 0x41100, 0x1, [], 0x0, 0x7}, 0x48) setsockopt$sock_attach_bpf(r0, 0x10d, 0x2, &(0x7f0000000000)=r0, 0x36) 12:06:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 403.649324] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 403.662939] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. 12:06:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000000e0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 1: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000240)=@un=@file={0x0, './file0\x00'}, 0x1d, &(0x7f0000000100), 0xcb94c09ca104e2b, &(0x7f0000000200)=ANY=[], 0xac}, 0x0) 12:06:41 executing program 3: getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) socket$kcm(0xa, 0x5, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000200)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r1, &(0x7f00000003c0)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="2e2f6367726f75702e6e652bb2ea7a7a3100", 0x200002, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900), 0x0, 0xc083}, 0x41) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x0) socketpair(0x11, 0x2, 0x7, &(0x7f00000002c0)) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='memory.high\x00', 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001980)={&(0x7f0000000440)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000900)=[{&(0x7f00000004c0)=""/246, 0xf6}, {&(0x7f0000000640)=""/211, 0xd3}, {&(0x7f0000000740)=""/77, 0x4d}], 0x3, &(0x7f0000000980)=""/4096, 0x1000, 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003040)={&(0x7f00000019c0)=@ll={0x11, 0x17, r3, 0x1, 0x10001, 0x6, @broadcast}, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001a40)="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", 0xe00}], 0x1, &(0x7f0000002a80), 0x0, 0x81}, 0x24000001) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'ip6_vti0\x00', 0x200}) 12:06:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000090000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000002c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xffffffffffff3ff6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r1, r2, 0xf, 0x1}, 0x10) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0x12) 12:06:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r0 = socket$kcm(0xa, 0x40122000000003, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x0, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d82, [], 0x0, 0xf}, 0x48) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0)=r1, 0x4) socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f0000000740)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x1000005, 0x0, 0x1}, 0x127) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000680), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)=@generic={0xc, "ddf95228adcb80d455a64ea96b388c597669d14253d4c01472089f2cfd33ee18601957bc7a0ee267debd46825d7baa4d9ff4e47649ba1ba27857ff311486d58cb08b2eb1bed032bbb59941c2626fde700c63a1aa80847916e8d614a8e84b706c2aff16592e209b8b80a7e685e9f9d3aaa59d695e36cb12585ccbda1b29d8"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1a5}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, &(0x7f0000000f80), 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x40000102) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) socket$kcm(0xa, 0x0, 0x11) perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0xffffffffffffff74, 0x7fffffff, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x1, 0x3, 0x0, 0x0, 0x2, 0x9, 0x0, 0x0, 0x0, 0xa520, 0xffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0xbca7, 0x7, 0x80000001, 0x0, 0x7fffffff, 0x0, 0x5, 0x2, 0x3, 0x1c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b4, 0xc2, 0x101, 0x0, 0x7, 0x0, 0x20, 0x0, 0x8, 0x7, 0x7000000000000000, 0x4, 0x0, 0x3, 0x2, 0x0, 0x7fff, 0xffffffff, 0x0, 0xa05, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x2040, 0x0, 0x9, 0x0, 0x0, 0xab}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1b, 0x6, 0x9, &(0x7f00000000c0)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9644a2c00d2970403dc0d") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000003c0), 0x2e1) 12:06:42 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:42 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:42 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=""/129, 0x81}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x1ff, 0x3, 0x9, 0xfffffffffffffff8}, {0x101, 0x10001, 0x75, 0x2}]}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000a00c6ff07d800400300000000000000000000", 0x23}], 0x1, &(0x7f0000000a00)}, 0x0) 12:06:42 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00a00080000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:42 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r1, 0x4) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:42 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x8, 0xa58, 0xe8e, 0x4, 0xffffffffffffff9c}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000040)="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", &(0x7f0000000140)=""/178}, 0x18) 12:06:42 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r0 = socket$kcm(0xa, 0x40122000000003, 0x11) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0x0, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d82, [], 0x0, 0xf}, 0x48) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0)=r1, 0x4) socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000800)={&(0x7f0000000740)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x14, 0x4, 0x4, 0x1000005, 0x0, 0x1}, 0x127) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000680), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)=@generic={0xc, "ddf95228adcb80d455a64ea96b388c597669d14253d4c01472089f2cfd33ee18601957bc7a0ee267debd46825d7baa4d9ff4e47649ba1ba27857ff311486d58cb08b2eb1bed032bbb59941c2626fde700c63a1aa80847916e8d614a8e84b706c2aff16592e209b8b80a7e685e9f9d3aaa59d695e36cb12585ccbda1b29d8"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="c0010000000000001f01000002000000b9100abd9ffe853624a1cfba4e436ff1fff968d0a5844e437f76724edaaf16abcdc4487ee2ab14c349ade352ac5ad5d36584e515a978e459da02f63afa4280eab13da1df5f9bf5669065b1cd7b838e02887fc77cadfa8fdfea5208b70b3a4e81e6c5098324b62a5435b3e9c38f08aac85d3797413ea4944a6b9f38a741d2f78b1f9993d6dae63cdcb143576c6847678587251400b00f53052f9fa36b0ec27dbe4085ec2c9e852935238845238d2100358b33f570e0b704000001000000002310a1a16154339487702d456b5de4ba68589dc9bd512c4b8f9c96e3b6edcbafe73097660e8cc887ee045de14dd12147e9dd03f026be2987d97c1a1933747301489d2bb2ee01ff0ece312290ffcb9637cfd4fb188729b5dd79552a952472779f8a72d6bccf33fa7d65f4c0e442f890e8f766fff9bf6c6c48414240ec6b8c10339496c643b1acf863e9ab8b04e1d23d67fdf7004778071913d17968b0c3a8f7079cf23bf9ca564bb9bab7a773c1220ca3aca460909e641d7e01faf752d0318adf0986a2e3b6471419bcd1c83630374f5fa2558c38849e0b1bdec7cdcd29d1588edc615f5b471c41ae7a936abd099e6a418a663a486c421a4cfaf21d56bb7070765790ac0811c971184f14c63c77a4592c69c9c457c7c4747de3b649edd64d3f402a4f5ff5bf15450443a958f00b4642abde0a9be16ccd0382d8951c507f5cb9a7bcd14f8ac8c114cbc07d8d42addf1bc17acecde9e9d828747b"], 0x1a5}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, &(0x7f0000000f80), 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x40000102) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000700)) socket$kcm(0xa, 0x0, 0x11) perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0xffffffffffffff74, 0x7fffffff, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x1, 0x3, 0x0, 0x0, 0x2, 0x9, 0x0, 0x0, 0x0, 0xa520, 0xffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0xbca7, 0x7, 0x80000001, 0x0, 0x7fffffff, 0x0, 0x5, 0x2, 0x3, 0x1c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9b4, 0xc2, 0x101, 0x0, 0x7, 0x0, 0x20, 0x0, 0x8, 0x7, 0x7000000000000000, 0x4, 0x0, 0x3, 0x2, 0x0, 0x7fff, 0xffffffff, 0x0, 0xa05, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x2040, 0x0, 0x9, 0x0, 0x0, 0xab}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1b, 0x6, 0x9, &(0x7f00000000c0)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9644a2c00d2970403dc0d") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000003c0), 0x2e1) 12:06:42 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000070000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:43 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000140)=r2) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:43 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xc, &(0x7f0000000100)='vmnet1$\vem0\x00', 0xffffffffffffffff}, 0x30) socketpair(0xa, 0x6, 0x7, &(0x7f00000003c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x386, 0x3fe000000000, 0x10a, 0x7cabf0e0, 0x0, 0x8, 0x0, 0xe, 0x5, 0x10000, 0x3000000000000000, 0x7, 0x2, 0xa853, 0x8, 0x6, 0x4, 0x2, 0x8, 0x7fff, 0xfffffffffffffff8, 0x5, 0x4, 0xffff, 0x100000001, 0x10000, 0x8000, 0xa12, 0x0, 0xa39, 0x3ff, 0x8, 0x80000001, 0x1000, 0x9, 0x5, 0x0, 0xfffffffffffffffa, 0x2, @perf_config_ext={0xc4, 0x1}, 0x18, 0xffffffff, 0x71c, 0x3, 0x3, 0x100000001, 0x1}, r0, 0x8, r2, 0xa) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x3, 0x70, 0x2, 0x9fc, 0x6, 0x400, 0x0, 0x3, 0x8018, 0x2, 0x1ff, 0x2, 0x1000, 0x4cd9, 0x8000, 0x0, 0x7, 0x84d, 0xffffffffffffffff, 0xfffffffffffffffb, 0x80000001, 0x7, 0xffffffff, 0x3ff, 0x3, 0x401, 0x0, 0x80000000, 0xb304, 0x1000, 0x80, 0x0, 0xff, 0x9, 0x4, 0x5, 0x10001, 0x5, 0x0, 0x4, 0x727db04237f5c99f, @perf_config_ext={0x10001, 0x7ff}, 0x1, 0xffffffff00000000, 0x80000001, 0x7, 0xfff, 0x0, 0x200}, r3, 0xc, r3, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, 0x0, 0x8001, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9994, 0x8, 0x10001, 0x0, 0x6, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x1}, 0xffffffffffffffff, 0xe, r3, 0x4) socket$kcm(0x29, 0x5, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x7, 0x70, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x800, 0x2, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x440, 0x0, 0x0, 0xea, 0x0, 0x0, 0x0, 0xff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, r4, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r0, r2, 0x0, 0xe, &(0x7f0000000400)='memory.events\x00', r1}, 0x30) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x26000) 12:06:43 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:43 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00004000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000015d6405000000000065040400010000000704000001000000b7050000000000006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000040)='threaded\x00', 0x9) 12:06:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:43 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r0, r1}, 0x10) openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:43 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x57df) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e000000670081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) 12:06:44 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x7, 0x7ff, 0x0, 0x0, 0x47e2, 0x0, 0x2, 0x20, 0x0, 0x1, 0x8001, 0x5, 0x7fffffff, 0x7, 0x5, 0x82, 0x4, 0x6, 0x40, 0x7fffffff, 0x20, 0x4cbeb1b4, 0x0, 0x3982, 0x39, 0x1cd4, 0x218, 0x800, 0xf3b0, 0x8, 0x5, 0x80000000, 0x401, 0xffff, 0x3, 0x0, 0x4, 0x4, @perf_config_ext={0x400, 0xfe}, 0x800, 0x5, 0xbd, 0x7, 0x0, 0xffffffffffffffff, 0x81}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x2) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x100) socketpair(0x2, 0x8000f, 0x9d9, &(0x7f0000001340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r4, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=""/130, 0x82}}, 0x10) openat$cgroup_int(r5, &(0x7f00000002c0)='cgroup.max.depth\x00', 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000001600)={&(0x7f0000001380)=@rc={0x1f, {0xffffffff, 0x2d1, 0x7f, 0x7ff, 0x1e, 0xdb}, 0xf2}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001400)="fa7625a1d968f0a73ea13b48df166d7bd470e8ee4677794c3b9267fd849dc785b695d41e5b1a7043cef51915b63c36c1af9012aef2416b9cbcec266e69f687", 0x3f}, {&(0x7f0000001440)="52db11bfd9b96514c635810159a5743a34f56adaba1441b2e4da0cc0416060c0c6fd2a4fabf9354f09062dc404057aaf2b5c48ac9d2fd60864f9d0716416737638d3fd0540a9277514d502071fc64b90fdec9f9be657fee0c0cc8e9068598fcdab56fd11", 0x64}, {&(0x7f00000014c0)="516de753fbfde5d7234b9b672ce167d836998018a658cb0ad26aab34f6cf6e68928dbd1a0d64482920cba46250e32943aefb09dba04e89db02ce88dc3b30f06dec3d20268a9ba87f66892d8da74cfbab3d533f0644a15cc33f85311116610e53b31e496b37ca521b4c3d1278ee1dec98", 0x70}, {&(0x7f0000001540)="41730d7ad6db1357ba15023c3a3bffc98f6d069216eb4da284cb189fcb52ad6c52caec18661dbdbaeb23f758686564604a84146a43f72ecc74296cc84b352950804604ab2aba501bbc2fc90a03c90455c91e99d617c9ab", 0x57}], 0x4, 0x0, 0x0, 0x80}, 0x4000) 12:06:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00003e00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x5}, 0x3ac) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000004c0)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000001e40)={&(0x7f0000001e00)='./file0\x00', r0}, 0x10) socket$kcm(0x29, 0x47fffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f00000018c0)={&(0x7f0000001740)=@in, 0x80, &(0x7f0000000440)=[{&(0x7f00000017c0)=""/175, 0xaf}], 0x1, &(0x7f0000001880)=""/42, 0x2a, 0x7f}, 0x101) sendmsg(r1, &(0x7f0000000400)={&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21}, 0x0, 0x0, 0x2, 0x4}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001640)="40edf673625d5ce0c816be58259352e7770f484322485be84710b9d1c47be3fe5391f48a288837e8b25c17f7185f89b5fbdff2b34d1aeaee820a728baca9a2d37dfc99b23e3f49422bf93a0ee6d6ec1daa5355e9c12e0f3d240886242bb6792ee1ada1c113d03bab0451c90c0db4ec0976a133413f7c93fe87b936e9578033fbe4e90a8ba2d02c0d92f34f01", 0x8c}], 0x1, &(0x7f00000003c0)=ANY=[], 0x0, 0x4004081}, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000340)='cpuacct.usage_percpu\x00', 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000001cc0)=@llc={0x1a, 0x108, 0x8, 0x9, 0x100000000, 0xfff}, 0x80, &(0x7f0000001d40), 0x0, 0x0, 0x0, 0x4004000}, 0x40000) socket$kcm(0xa, 0x5, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x7, 0x3}, 0x11) openat$cgroup_type(0xffffffffffffffff, &(0x7f00000025c0)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x6) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000001940)=0x7) close(r3) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001900)='\x00') openat$cgroup_ro(r2, &(0x7f0000000500)='cpuacct.usage_percpu\x00', 0x0, 0x0) 12:06:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0xa, 0x300) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x7}, 0xffffffffffffff13) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000140)=0xfffffffffffffffd) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socketpair(0x7, 0x3, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000280)=ANY=[@ANYBLOB="0500051e0080bb1551c98a46c081ab8e0180c200000000000080c14f4a77000064a400ee02633d6d4a926b87f4f857b0e08a09dfc96dba61a7fa0c6af7986c79468432ed2d2c3ccf84f8a08193d8227e51fa0701d4edfbceea7cbd7b605d078181f322"]) 12:06:44 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r2}) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00008000a00000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:44 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:44 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) close(r0) r1 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000080), 0x4) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000001c0)="a0", 0x1}], 0x1, &(0x7f0000000800)}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETLINK(r3, 0x400454cd, 0xffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg$kcm(r1, &(0x7f0000005140)={&(0x7f0000003000)=@xdp, 0x80, &(0x7f0000004100), 0x0, &(0x7f0000004140)=""/4096, 0x1000}, 0x102) 12:06:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000003f0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:44 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='memory.max\x00', 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 406.867669] protocol 0800 is buggy, dev ip6tnl0 [ 406.876766] protocol 0800 is buggy, dev ip6tnl0 [ 406.896537] protocol 0004 is buggy, dev gre0 [ 406.903659] protocol 0800 is buggy, dev ip6tnl0 [ 406.909238] protocol 0800 is buggy, dev ip6tnl0 12:06:44 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)="2e2f0d091c25d19e63", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 406.914106] protocol 0004 is buggy, dev gre0 [ 406.919494] protocol 0800 is buggy, dev ip6tnl0 [ 406.924351] protocol 0800 is buggy, dev ip6tnl0 [ 406.929837] protocol 0004 is buggy, dev gre0 [ 406.934565] protocol 0004 is buggy, dev gre0 12:06:44 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000000a0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 5: r0 = socket$kcm(0xa, 0x400000000007, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000000c0)='!', &(0x7f0000000340)}, 0x20) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000280)=@pppoe={0x18, 0x0, {0x3, @random="4b9f24ac39cf", 'vlan0\x00'}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000300)="a5c1d734df9a217cf1efbebd6a51eb5a50c5fa4ca17ba349fe877238a92c7eac4435d28534c40308681940df77b4b246fe53b34ea154839fd9949de6c703e689c11c6145a25d605f8aa472b23cbc47073f065f8c46008bf9f6e319cc", 0x5c}, {&(0x7f0000000380)="8ca25c9634c0dbbe775a1a44c003902aad75bc49960653722460c2b709c0053bbea6c5b5b5d342f269e1195f41609c3675902eaa749223fc1b54e6f64084fbfc07c1702bc6e78ca184180419bf6fb8f539d2ce5d5811a52aa1e30553f38c1f5f172abf748914f8d13df3fd5f68a390f20e4e39798a8c4a2331113465ca9dc76833ceff7cb36f4a509ea79c4beb856f119092693c19fc5537e5cd47788a9de8943d8ca6b143714552ff9644c5b754ec473450930e042e21e800b06cbd001ae91ab90a5ca97fb070335bdf7cb3add9af974030dbb2dd2d895ff99adc4c691e24b5479ef105c53fe42b1fb7", 0xea}], 0x2, 0x0, 0x0, 0x4000000}, 0x24000080) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000001c0), 0xdd) r1 = perf_event_open$cgroup(&(0x7f00000004c0)={0x7, 0x70, 0x3f, 0x0, 0x0, 0x9, 0x0, 0x5, 0x1020, 0x1, 0x2f, 0xdb1, 0x7, 0xc5e, 0x7ff, 0x2, 0x1, 0x9, 0x8cf, 0x400, 0x711b17b, 0xac, 0xa1a1, 0x0, 0x2, 0x1fffffffe, 0x1, 0x8, 0x8000, 0x8, 0x2, 0x400000000, 0x4, 0xffffffff, 0x1, 0x4, 0x3f, 0x4b, 0x0, 0x7, 0x6, @perf_config_ext={0x400, 0x4}, 0x900, 0xe3b3, 0x5, 0x9, 0x3, 0x9, 0xf3d9}, 0xffffffffffffff9c, 0x8, r0, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1ff) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x0, 0x80fe}, 0x314, &(0x7f00000001c0), 0x12f}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000180)='vlan0\x00'}, 0x30) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000480)=ANY=[@ANYBLOB="0900000000000000000000000000000000f526b9ac"]) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x8) 12:06:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="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", 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="007069063a4b216370712000696f202d696f20"], 0x13) 12:06:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00003f00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:45 executing program 3: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0), 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:45 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000200ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="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") r1 = socket$kcm(0xa, 0x40122000000003, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d82, [], 0x0, 0xf}, 0x48) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0)=r2, 0x4) r3 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r1, &(0x7f0000000800)={&(0x7f0000000740)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000680), 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)=@generic={0xc, "ddf95228adcb80d455a64ea96b388c597669d14253d4c01472089f2cfd33ee18601957bc7a0ee267debd46825d7baa4d9ff4e47649ba1ba27857ff311486d58cb08b2eb1bed032bbb59941c2626fde700c63a1aa80847916e8d614a8e84b706c2aff16592e209b8b80a7e685e9f9d3aaa59d695e36cb12585ccbda1b29d8"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000f80), 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x40000102) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)=r4) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000700)={r3}) socket$kcm(0xa, 0x0, 0x11) perf_event_open$cgroup(&(0x7f00000004c0)={0x2, 0xffffffffffffff74, 0x7fffffff, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x1, 0x3, 0x0, 0x0, 0x2, 0x9, 0x0, 0x0, 0x0, 0xa520, 0xffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x1f, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x101}, 0x0, 0x0, 0x1, 0x7, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x22, 0x0, 0xfffffffffffffffa) perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0xbca7, 0x7, 0x80000001, 0x0, 0x7fffffff, 0x200, 0x5, 0x2, 0x3, 0x1c00, 0x0, 0x2000001c00, 0x1, 0x0, 0x0, 0xd9b4, 0xc2, 0x101, 0x0, 0x7, 0xfc, 0x20, 0x0, 0x8, 0x7, 0x7000000000000000, 0x4, 0x0, 0x3, 0x2, 0x0, 0x7fff, 0xffffffff, 0x0, 0xa05, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x2040, 0x0, 0x9, 0x0, 0x0, 0xab}, 0x0, 0x9, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000b40)={0x3, 0x70, 0x9, 0x8, 0x7, 0xfffffffffffffffc, 0x0, 0xffffffffffffc96d, 0x4020, 0x9, 0xffffffffffff0d93, 0x3, 0x2, 0x0, 0x5, 0xff, 0x40f, 0x269, 0x6, 0x7e8d, 0x9, 0x5, 0x1541cf94, 0x5, 0x8, 0x819, 0x6000000000, 0x939, 0x5, 0x2, 0x80000000, 0x7, 0x1000, 0x6, 0x40, 0x0, 0x80000000, 0x101, 0x0, 0x5ae4e1d3, 0x0, @perf_config_ext={0x6, 0xa7c7}, 0x0, 0x1f, 0x4, 0x954a04e73dfaad99, 0x5, 0xfffffffffffffd38, 0xfffffffffffffff9}, 0xffffffffffffffff, 0xb, r0, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1b, 0x6, 0x9, &(0x7f00000000c0)) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9644a2c00d2970403dc0d") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000003c0), 0x2e1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000d00)={0x5, 0x70, 0x5, 0x4, 0x2, 0x7f, 0x0, 0x0, 0x40000, 0x4, 0x0, 0x11, 0x0, 0x88d, 0x6, 0xff, 0x100000000, 0xa631, 0x7fffffff, 0x8, 0x186000, 0xffffffff, 0x40, 0x3, 0x4df, 0x0, 0x40, 0x3, 0xffff, 0x7fffffff, 0x8, 0x81, 0x100000000, 0x3, 0x779bdf57, 0x2, 0x46, 0x8000, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x3f, 0xfff, 0x0, 0x9, 0x6, 0x7fffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000680)="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") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x0, 0xb1, 0x6c, &(0x7f0000000580)="c7ad45d953d391029b142541b8f6518d6f978836e064a560fbf34c022619dc109703e0f5e9771c0547f584cfba74bae7a211c79b457d00f6fb7ade541b2f2bac7026dd4a2519c93881f43ebbc99c0e7e15329bed2383f4aa7ad3258d2b91087d4d6da8e882af89d78a28cdf4b6e3d0788b3be5eca25d1f2ab285b365ed19469e481d70b9660fcc0bca3b45461cc881b3c04c8b2fe881fcda32862e7d15820045121a48f7d5e333a1b5d38c56d59858f0a8", &(0x7f00000008c0)=""/108, 0x719f}, 0x28) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000200)) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x2) 12:06:45 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xf, 0x2, &(0x7f0000000340)=@raw=[@exit, @exit], &(0x7f0000000700)="ee762d9dd2235839be2d4d93756641692ac4962530e58d5c533b1841bda042faba2ca4650708fbaa92077c43940b313d6e9b34", 0x4, 0x3f, &(0x7f0000000500)=""/63, 0x41000, 0x1, [], 0x0, 0xf}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000005c0)={0xffffffffffffffff, r2, 0x4}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x40000000000000}, 0x2c) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) bpf$MAP_CREATE(0x0, &(0x7f0000000600)={0x0, 0x80000000, 0x1, 0x0, 0x32, r3, 0x8e35}, 0x2c) r5 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000380)="6e7230070060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x802}) ioctl$TUNSETVNETLE(r6, 0x400454dc, &(0x7f00000000c0)=0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r2}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000200)="d32edd93345f1db780cafe7384239d4dfb652c50218ea7c59c54589f441032dcded670f40da9b72a87e4d4e3eef09da1b45357b408e87caa8c4de88c41123e0b1a81eacfe66c4290bfbd14c3"}, 0x10) recvmsg$kcm(r1, &(0x7f0000004f80)={&(0x7f0000004b40)=@hci, 0x80, &(0x7f0000004e80)=[{&(0x7f0000004bc0)=""/134, 0x86}, {&(0x7f0000004c80)=""/175, 0xaf}, {&(0x7f0000004d40)=""/136, 0x88}, {&(0x7f0000004e00)=""/9, 0x9}, {&(0x7f0000004e40)=""/3, 0x3}], 0x5, &(0x7f0000004f00)=""/123, 0x7b, 0x6}, 0x10000) recvmsg(r5, &(0x7f000000c780)={&(0x7f000000c580)=@can={0x1d, 0x0}, 0x80, &(0x7f000000c680)=[{&(0x7f000000c600)=""/116, 0x74}], 0x1, &(0x7f000000c6c0)=""/165, 0xa5, 0x6}, 0x100) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, &(0x7f000000c7c0)=ANY=[@ANYBLOB="18000000000000000000d083524619f58e03625e5a0000000000007910000000"], &(0x7f0000004fc0)='syzkaller\x00', 0x0, 0xffffffffffffffb3, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], r7, 0x1}, 0x48) r9 = socket$kcm(0x11, 0x2, 0x300) write$cgroup_int(r6, &(0x7f0000000000), 0x12) close(r9) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f00000006c0)) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r10 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r8) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000280)='user@\x00') 12:06:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:45 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000fffff00000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:45 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000e00ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:46 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x6000, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:46 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:46 executing program 3: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mem_exclusive\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380), &(0x7f00000003c0)=""/33}, 0x18) unlink(&(0x7f0000000400)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28, &(0x7f0000000200)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0x28, &(0x7f0000000280)}, 0x10) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x5, 0x0, 0xfa3, 0x40, 0x0, 0x0, 0x0, 0xa, 0x1, 0x8113, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffc0, 0x0, 0x0, 0xb0e, 0x5, 0x6, 0x0, 0x2, 0x401, 0x0, 0x8, 0x6, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x744, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xe326}, 0x0, 0x7fff, 0x4, 0x4, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffff9c, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x0, 0xff, 0x4, 0x91, 0xc, r0, 0x20}, 0x2cc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000380)={'dummy0\x00', 0xe710da50ec670656}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) 12:06:47 executing program 1: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000011d400300000000006506000001ed00002704000000ffffffdd460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)="505c881c"}, 0x48) 12:06:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000007000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006018, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) socketpair$inet(0x2, 0x80007, 0x101, &(0x7f0000000000)) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:47 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1e, 0x2af, 0xacbf, 0x6, 0x0, 0x0, 0x40008, 0x1, 0x6fbe, 0x9, 0x9, 0x6, 0x7fffffff, 0x1, 0xc7fe, 0x8, 0x3, 0x1f, 0x3, 0x10001, 0x7, 0x1, 0x7a, 0x9, 0xffffffffffff11fb, 0x100000001, 0x5, 0x0, 0x8001, 0x7ff, 0x0, 0x7, 0x3, 0x40, 0x6, 0x7, 0x0, 0x5, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x4}, 0x200, 0x40, 0x80, 0x3, 0x0, 0x4, 0x5}, 0xffffffffffffffff, 0x5, 0xffffffffffffff9c, 0x3) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) socket$kcm(0x29, 0x0, 0x0) 12:06:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x200002, 0x0) socketpair(0x3, 0x7, 0x2000000000000000, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000080)='./cgroup\x00'}, 0x30) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0xf) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000200000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006007, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:47 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x202, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xe, 0x7, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xcb}, [@generic={0x1ff, 0x1f, 0x1, 0x3, 0x9}, @jmp={0x5, 0x20, 0x0, 0x6, 0xb, 0x0, 0xffffffffffffffff}, @exit, @jmp={0x5, 0xff, 0xb, 0x7, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x1, 0xea, &(0x7f0000000140)=""/234, 0x41f00, 0x1, [], 0x0, 0xd}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r1, r2}) setsockopt$sock_attach_bpf(r1, 0x29, 0x3b, &(0x7f0000000700)=r2, 0x4) close(r1) 12:06:47 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x17}, @call={0x85, 0x0, 0x0, 0x33}, @exit, @call={0x85, 0x0, 0x0, 0x2f}, @alu={0x7, 0x0, 0x8, 0x9, 0x1, 0xfffffffffffffffe, 0x18}, @map={0x18, 0x0, 0x1, 0x0, 0x1}, @jmp={0x5, 0xdf, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x7c, &(0x7f00000000c0)=""/149, 0x40f00, 0x1, [], 0x0, 0xb}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x19, 0x3, &(0x7f00000003c0)="e3b0283ebdc96c38f9532e14fa391d3c16646c3395c460c34a", &(0x7f00000002c0)=""/3, 0x4}, 0x1d) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000240)='syz1\x00', 0x200002, 0x0) socketpair$inet(0x1e, 0x4, 0x0, &(0x7f0000002500)={0x0, 0x0}) sendmsg(r2, &(0x7f0000000040)={&(0x7f0000000100)=@llc={0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f00000001c0)}, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r0, 0x50, &(0x7f0000000440)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r4, 0x4) openat$cgroup_subtree(r3, &(0x7f00000004c0)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x80000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)="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") socketpair(0x0, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00'}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000072c0)) r5 = socket$kcm(0x29, 0x402000000, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000080)='./file0\x00', 0x4) perf_event_open$cgroup(&(0x7f0000001640)={0x0, 0x70, 0x6000000, 0x80000001, 0x7, 0x0, 0x0, 0x7, 0x1, 0x1, 0x5, 0x8, 0x10000, 0x6, 0x7, 0x0, 0x1, 0xfffffffffffffffd, 0x2, 0xffffffff, 0x9, 0x0, 0x10000, 0x9, 0xffff, 0x4, 0x4, 0x4, 0x7, 0xffffffff00000001, 0x80000001, 0x3, 0x5, 0x943f, 0x1000000000000, 0x8000, 0x537d, 0x80000000, 0x0, 0x50d8, 0x5, @perf_config_ext={0x2, 0x16}, 0xc, 0x81, 0x80000001, 0x7, 0xfffffffffffffbff, 0x8, 0xfffffffffffffff9}, r1, 0xe, r3, 0xe0ed1651d4d37b27) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e24}, 0x3, 0x4, 0x4, 0x1}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000800)}], 0x1, &(0x7f0000002e80)}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001580)={0x0, r0, 0xffffffffffffffff, 0x2}, 0xfffffffffffffec5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r4, 0x50, &(0x7f0000000e00)}, 0x10) socketpair(0x0, 0x0, 0x5, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) openat$cgroup_ro(r2, &(0x7f0000001700)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000001740)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) recvmsg$kcm(r8, &(0x7f0000001500)={&(0x7f0000000380)=@can, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/124, 0x7c}], 0x1, &(0x7f0000000500)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xa, 0x200000000000023c, &(0x7f0000001600)=@raw=[@jmp={0x5, 0x0, 0xf, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}], &(0x7f0000000300)="00100000", 0x104, 0x1a, &(0x7f00000015c0)=""/26, 0x41000, 0x405, [], 0x0, 0x9}, 0x89) 12:06:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000a00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:47 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x80080, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f00000000c0)={0x1, 0x4, [@dev={[], 0x21}, @remote, @dev={[], 0x1f}, @broadcast]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="230000005e0081aee4050c00000f00000000a300001832e0b58bc609f6d8db51260185", 0x23}], 0x1, &(0x7f0000000a00)}, 0x0) recvmsg$kcm(r0, &(0x7f0000002580)={&(0x7f0000000140)=@generic, 0x80, &(0x7f0000002480), 0x0, &(0x7f0000002500)=""/97, 0x61}, 0x40012142) 12:06:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r1) 12:06:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) mkdirat$cgroup(r0, &(0x7f0000000280)='syz0\x00', 0x1ff) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x6, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x28, &(0x7f0000000180)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000080)}, 0x10) 12:06:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000a000800000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:47 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_spread_slab\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000300), 0x2c0) write$cgroup_int(r1, &(0x7f0000000080)=0x2000003, 0x12) close(r0) 12:06:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x180000000000600e, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:47 executing program 3: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x8a, 0x1000, &(0x7f0000000080)="10627abc73485f261d26aef0d2a4eb895ac1b9fd817cd78ff7c6d7c58e16c2ad570789dad8abaa4c6771266d3a20f6178368f7dbbaf8a9b6e056cc2ff937cb49381f43fd7e79485dca83d990495b01f8a3b45b71bf533a0faffa17af5ed988e39d613445e829c7bde9669f4723e760fb043c51e5c906ebf7df3bfd142d3d0d91b93e3b9f78b75d539fc4", &(0x7f0000000280)=""/4096, 0x2}, 0x28) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) unlink(&(0x7f0000000180)='./file1\x00') 12:06:47 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:47 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000500ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='.oup\x00\x00\x00\x00\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:48 executing program 1: socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10000000000b, 0x4, 0x3ff, 0x5, 0x40000000000000, 0xffffffffffffffff, 0x0, [0x140]}, 0x2c) r1 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x22, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000080)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r2, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r3, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) 12:06:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006060, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000005000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x80000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)="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") socketpair(0x0, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00'}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000072c0)) r5 = socket$kcm(0x29, 0x402000000, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000080)='./file0\x00', 0x4) perf_event_open$cgroup(&(0x7f0000001640)={0x0, 0x70, 0x6000000, 0x80000001, 0x7, 0x0, 0x0, 0x7, 0x1, 0x1, 0x5, 0x8, 0x10000, 0x6, 0x7, 0x0, 0x1, 0xfffffffffffffffd, 0x2, 0xffffffff, 0x9, 0x0, 0x10000, 0x9, 0xffff, 0x4, 0x4, 0x4, 0x7, 0xffffffff00000001, 0x80000001, 0x3, 0x5, 0x943f, 0x1000000000000, 0x8000, 0x537d, 0x80000000, 0x0, 0x50d8, 0x5, @perf_config_ext={0x2, 0x16}, 0xc, 0x81, 0x80000001, 0x7, 0xfffffffffffffbff, 0x8, 0xfffffffffffffff9}, r1, 0xe, r3, 0xe0ed1651d4d37b27) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e24}, 0x3, 0x4, 0x4, 0x1}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000800)}], 0x1, &(0x7f0000002e80)}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001580)={0x0, r0, 0xffffffffffffffff, 0x2}, 0xfffffffffffffec5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r4, 0x50, &(0x7f0000000e00)}, 0x10) socketpair(0x0, 0x0, 0x5, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) openat$cgroup_ro(r2, &(0x7f0000001700)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000001740)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) recvmsg$kcm(r8, &(0x7f0000001500)={&(0x7f0000000380)=@can, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/124, 0x7c}], 0x1, &(0x7f0000000500)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xa, 0x200000000000023c, &(0x7f0000001600)=@raw=[@jmp={0x5, 0x0, 0xf, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}], &(0x7f0000000300)="00100000", 0x104, 0x1a, &(0x7f00000015c0)=""/26, 0x41000, 0x405, [], 0x0, 0x9}, 0x89) 12:06:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) socketpair(0xb, 0xb, 0x101, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r2}) openat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000040000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000002c0)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/104, 0x68}], 0x1, &(0x7f0000000240)=""/91, 0x5b, 0x1}, 0x10002) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xf, 0x8, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8000}, [@generic={0x7fff, 0x3, 0x2, 0x9, 0x3}, @alu={0x4, 0x1, 0xe, 0xf, 0x3, 0x80, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5e6d, 0x0, 0x0, 0x0, 0x1}, @ldst={0x3, 0x3, 0x0, 0xb, 0x6, 0x30, 0xfffffffffffffff5}]}, &(0x7f0000000340)='syzkaller\x00', 0xff, 0xc2, &(0x7f0000000380)=""/194, 0x0, 0x1, [], 0x0, 0x3}, 0x48) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000500)={r0, r2}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007126000000000000bf67000000000000770600000f0000006706000002000000070600000ee619f2bf250000000000001f6500000000000067070000000000000707000099741df70f75000000000000bf5400000000000007000000040000003d43010000000000950000000000000061162000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 12:06:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x180000000000603e, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 12:06:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000003e000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) socketpair(0x1, 0x2000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@ipx={0x4, 0x1, 0x5, "502c184b24f8", 0x7f}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)="29769aa9ce20a9bb343b544616c8af52edcaa496e29c968ba08964225d03", 0x1e}, {&(0x7f0000000180)="cf680dc4f5b4ff89435aa6f7231434f4074abf6ffe2a5c58c996fcc5e523bcc6cf3834a2ebe092c14925efbb92e467410ba90877e411462ecb907639b9dd9960f271b03f670cb424516f52f375f0a7f3410ac2c94094af85b235a717c4e649b540ce40717f2a12fc0731e9405b91658d7c824429eef5850ad836f344f95e4fc773f0584add10609d16debedb8a1b9600997888e1fc1879c33fd9a49bc936ce7e36ebf764c92d95a65a059fde6cd9d726b40b5a3d71b4e448025e4465df055b", 0xbf}, {&(0x7f0000000300)="5e4465ef85e7c4ea80032633194fbd3bb84cc576cad386f89812b5d750e049f07937e017d5d833a08892fedce4fcb06974bbd88c65231e199f59ecde9c9ebd110cc1536fe30f5e4c12488ddf7175beb7cbf3ab7886ca264574544c033ae096b9f654415d349daca1e85a1452717291d84b6a400dd335dc15809b2ba2afa08c49919c6b19cca078ad51d2307c456f8c86cd3e0d05f769fb51b615aa9324393b9d183a545cc3772d44aa5a756d88f9288678efe4d4dcc742ee7fe991a42cf5d0f6e697945485fefef57f91aca2034912c68b34a49cf7ddd4a36d4414", 0xdb}, {&(0x7f0000000400)="64342c6bed03079d761865bd1f894109f4e8a943388dd0a3b5defd4d6d196aae84c422b92602f2ff3ea573c506ac8e1f31429dc3ba4a40f16c7a83bf73d64fb6d1a973d11b1111a0eb0acb7be1031948e37fd44fa3a3608bc3e5df9401c1208385f04bc9f7d3d23dfc6eb9165cc9e9e0fc6721215568eba44d63b9458de9e03df8abc15bfe739989e2dcde1c299c2f", 0x8f}, {&(0x7f00000004c0)="b1a8d4def8d0935ed08643337be70c3ba66c14fc420f8a222b494b7d8f7a45232c2d32f7ba55059b0b5562f13c15d7994bc2f30d8e3ac3a249d929df882c84fb0c1665b1b48d0e2a0a8f7e323458315d2863d0769525ec32aa12cef8e6379ed96ecaa8db83518f742f396f4602f6bac205f24059c0494c2696e235bb6a4e9926fd6dff9c88b9d21d302aa4683e81d7355a286d4a89d7d59f1f59dfd2a6e631c8ed10aeab0dca3531ea6c2456730110898c7ad41ae857cf2b550edb", 0xbb}, {&(0x7f0000000640)="2f5a8b70e995d4507a90a595b2b0825033dbe49e7c394abb9063c34b6ed9e8d58ee02dbd7ddc1cd49c40d4981bb7245cbb5bab8710da4fb08fcd66df79a6389e78b0f886d2c94620827bef94f4797d7942a5f391c0a9b72b711bf0cf62272f2c5181f77ff9791f60282a7c1827e71c4c8b51e47f9c160618a117e49834d366facda38df63b79d8b48037f795dc63bf1ee57b504e74994f612ef7851fe1efa4c5307dc76971a4ac713a6dcdd5b47e9973813076d9e4757bfbffe1475fb5b5b58e7c870113f738c3bc9b023c417659f5a6ebb16052c9c314b6fe7d77a5982c6267084f253efc4a12cb", 0xe8}, {&(0x7f0000000780)="b0fe0cc777dd185f816534aa0cc0b5c3960e279f86c89bbd3116cbf7bcfa3c706a85e8993c1d5bc57874f1324a69df4ec41ef3b97739dd1e1c2b4ddcff998eb03165d9886c9ab09a54c070db5a7a0f06db44a9d7569f591e65d251ccbc2a128ddab6c85d0947ec811497e369322a4ef6d1970dc261f816f4963520357b1150b0f29083aab51c9d4b", 0x88}, {&(0x7f0000000840)="b61ccfe140d8e110c818b4ad733ae888bb547b5a5d718215105fa68efe8b69d403bb915f5320320cb6ebda9723242c6c6ae3bfff7ec8525dd7b100d7e9dc66b3b3379366b6185343f8de96ad5ea8d09eca81960a36a951f1cb8d28c74af4218573865ee4db6520fe8579a2f8c8c6047e5122e1080cf6d7cc8493c430b3f5b5916ffffe706756a9e44366514be2085de8863981f0ef32dd111d5a49ce8dfe8bd71543e3911fa525f03633621bc9c514fcaa05679a0af22d5d7591ac93068c67b424b29eb9e790030cbfb934", 0xcb}], 0x8, &(0x7f0000000940)=[{0xc0, 0x10f, 0x6, "e7df2bd3f280baa89be87f2068e48eb18c64d35d6ba96c34e3c2d0e3a8811a5df53cddb471cf7fdbc6ded59c1ecc78593995495bc9ca6f9f535ca37a5c90056d84735f35831438384a21e23ad617bbb3890f9f14d154b0f5853680f3489ab085f890cd29e4cee398dbffb0cfe1f082892932f756e2558614db61107edd006f9084307a2dfbbfd7b66c987aa36a7cb7ec9830b6be856efa3af3be557ab7c9e01d6bf4f2463c5f53df801a66"}, {0xb0, 0x109, 0x2, "259a6103aa6ccb461bd44257c597c725c77dd8e4851ac850a4e892a099e24ae285364e94b0461fd396ff1b9722e5c36d928828b3a982df3fa21f8fc47de1d1d102d67a80eb06276ae59ccb849dd19409267daadbfcc750fb8b52d13e73839d5deabe7776a3d859e9a6517ecacee8294bd15cdcb69ec31195029c3b9197d25bfadfbeac7f75548e0601f854e4f3e92f9e1b3aa6ca1a62627fbf05"}, {0xf0, 0x0, 0x3, "f5625dafbdf09e75c4fa7691b3acb5bee320d32d518b555c117e0e84645e04035fa92cafa25f649b37a6c77ee6a9ad0ba2e4bda2e960eec9884431a3b415847b2c32c7f6ec257f8d1692272f42285971b5cb531276adc47fcbf702181673a9ca379f7f982e7b4cbd2d938cfa6800d94d99971122e4995fcd20ee72f670f665485a7a8f5072a196b320c8612c3f030aa9d4f2952185f4948595391aad897211d94b94b28fd5176fa42389ae95c7879446797e5b6e7e13cae032d5e8b49c660e04e35cecb682d99c702b8842119be9c2d4bb5a34f8fe0f9788b12de9b1ee60cd07"}], 0x260, 0x800}, 0x8000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xe, &(0x7f0000000380), &(0x7f0000000600)=""/14}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8990, &(0x7f0000000580)='ip6gre0\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001580)}, 0x0) 12:06:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006002, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000040)) r0 = perf_event_open$cgroup(&(0x7f0000000340)={0x7, 0x70, 0x4b5, 0x1, 0x8000, 0x3, 0x0, 0x31f8, 0x40800, 0x1, 0x1000, 0x1, 0x2, 0x6, 0xfffffffffffffff7, 0x9, 0x7, 0x3, 0x8, 0x2437, 0x40, 0x100000000, 0x0, 0x2a2, 0xd800000000000000, 0x2, 0x2, 0x4, 0x6, 0x6, 0x8f, 0x3, 0x80, 0x40, 0xfffffffffffffff7, 0x1, 0x0, 0x3, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x4000, 0x1, 0x1, 0x0, 0x800, 0x6, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0xf) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000000)='./file0\x00', 0x0, 0x98}, 0x2dd) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0x33, 0x70, &(0x7f0000000080)="6735b294c4929d99dc80428da57650f81038ca0f4d607eafa76d512b4da8b6d1542ade93af51bf387f61a3badc3d4aa6f888fe", &(0x7f00000000c0)=""/112, 0x4}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000014c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367060000001c", 0x200002, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001580)='\x00') r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x8002, 0x0) ioctl$TUNATTACHFILTER(r4, 0x401054d5, &(0x7f0000001540)={0x4, &(0x7f0000001500)=[{0xfff, 0x7, 0xec, 0xfda4}, {0x5, 0x20, 0xc6, 0xffff}, {0x18af, 0x64b, 0x379e40000000, 0x200}, {0x6, 0x1, 0x20, 0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000280)={r5, r2}) openat$cgroup_subtree(r3, &(0x7f0000000400)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001480)={r1, 0x0, 0xe, 0x1000, &(0x7f0000000440)="9151f4dcbe65ee72c7661ef65059", &(0x7f0000000480)=""/4096, 0x4}, 0x28) 12:06:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00006000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x80000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)="6c6f00966f380f64a1e3d75d627d1fa159ad34909d60d298000000202759175d1563ca52dd984f43891be784e2058077d27c448d4b144278cb7548c2ee63bf3c3e591afc1f394f4281891636c571406eb4b673b00000fc0000080000daefec45ecd549b29bfe8d903f00e9e47e673ac1b2616a96bba7e2c0dcf95108eb167f5411d30d37e62266cf8eab640f747082aed2158e2b63f6bfe1343ea62da563ded7abea1ff873329c5646d518fe0e8f20010000792efc2a82a5a17035c87bf7efabe899eb77238a741c80fcb095a2a7d72c595d45388358f546dc882df5b0b55edb1ab6aa14e2b90d685e4a2dd1ba556e04276c1be06fdbc891251cb5bfb690b4c27f5d2fb3e7c92794cf496fdf0495b506841f483edac504209488eb27d43b367fd9992d1b7c478dd4b925aa51a04b100393e1cce76d8027f0a5ed280da80f26b1f3ff300c82255f928b44b9d9e7f2e4c16923dc8741b9c70d92fa1111b51f039ddd1b6adfac67e3a053d38ae16e97eaf5a0270be9a0f12066aa6ecfb569b664bc920bd5381608b35f3aa4210a79c4260a574d4da8c40b9f016ff4ab26b6170250c3214ea18622d704f1c021edffee24c8398c4230d16444e0495088a2f2599a662424f18196f750acca803a21b49423cb5e9f2703e393b982bfcfc4e3f7034f68f272ca8f66bb2f9f2aaf1a20a5a03f254da58698fa342731c70c3ccc40e88aac2edee4c7f59c6ba43021e91424b3056db56ded0c7493d8a3802759b905bb747cbebc7a0af3f570f89f7e1bd00b1c51") socketpair(0x0, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00'}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000072c0)) r5 = socket$kcm(0x29, 0x402000000, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000080)='./file0\x00', 0x4) perf_event_open$cgroup(&(0x7f0000001640)={0x0, 0x70, 0x6000000, 0x80000001, 0x7, 0x0, 0x0, 0x7, 0x1, 0x1, 0x5, 0x8, 0x10000, 0x6, 0x7, 0x0, 0x1, 0xfffffffffffffffd, 0x2, 0xffffffff, 0x9, 0x0, 0x10000, 0x9, 0xffff, 0x4, 0x4, 0x4, 0x7, 0xffffffff00000001, 0x80000001, 0x3, 0x5, 0x943f, 0x1000000000000, 0x8000, 0x537d, 0x80000000, 0x0, 0x50d8, 0x5, @perf_config_ext={0x2, 0x16}, 0xc, 0x81, 0x80000001, 0x7, 0xfffffffffffffbff, 0x8, 0xfffffffffffffff9}, r1, 0xe, r3, 0xe0ed1651d4d37b27) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e24}, 0x3, 0x4, 0x4, 0x1}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000800)}], 0x1, &(0x7f0000002e80)}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001580)={0x0, r0, 0xffffffffffffffff, 0x2}, 0xfffffffffffffec5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r4, 0x50, &(0x7f0000000e00)}, 0x10) socketpair(0x0, 0x0, 0x5, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) openat$cgroup_ro(r2, &(0x7f0000001700)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000001740)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) recvmsg$kcm(r8, &(0x7f0000001500)={&(0x7f0000000380)=@can, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/124, 0x7c}], 0x1, &(0x7f0000000500)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xa, 0x200000000000023c, &(0x7f0000001600)=@raw=[@jmp={0x5, 0x0, 0xf, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}], &(0x7f0000000300)="00100000", 0x104, 0x1a, &(0x7f00000015c0)=""/26, 0x41000, 0x405, [], 0x0, 0x9}, 0x89) 12:06:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000680)=""/65, 0x41}, {&(0x7f0000000a80)=""/12, 0xc}], 0x397, &(0x7f0000000c80)=""/116, 0x74}, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1f, 0xa, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x9, 0xd, 0xf, 0xb, 0xfffffffffffffff8}, @exit, @ldst={0x0, 0x2, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0xffffffffffffffff}, @map={0x18, 0x2, 0x1, 0x0, 0xffffffffffffff9c}, @generic={0x4, 0x6, 0x1f, 0xcf, 0x7f}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xcb3, 0x0, 0x0, 0x0, 0x5}, @generic={0x9, 0x8, 0xfffffffffffff000, 0x100000000, 0xfffffffffffffffa}], &(0x7f0000000140)='syzkaller\x00', 0x7, 0x79, &(0x7f00000002c0)=""/121, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) r2 = socket$kcm(0xa, 0x2, 0x0) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900), 0x0, 0xc083}, 0x41) recvmsg$kcm(r2, &(0x7f0000002040)={&(0x7f0000001ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001f40)=""/80, 0x50}], 0x1, &(0x7f0000002000)=""/48, 0x30, 0x3}, 0x2000) sendmsg(r2, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000400)="3c37cddbab44aa643f1872073a4656fc48ea12fc4ccf7c49a4d3963e2e39057d7e28ea962e3ef6ec4956e6c0a87e2a63af1e7dbf3f98664251c0bc9101a92b6eba41daa6222a83a8", 0x48}, {&(0x7f0000000480)="ebb31cc078c8200126b6956c276569e1408e6fc2f2f00e4238d5bace0758d8044b037c40b7d2d98365a9c3e3f919fc7e5b33db1feeb5bc166437e6ed81a2881080d2abf0c49902f48af2", 0x4a}, {&(0x7f0000000500)="0395538a6daf1528b7284c25eb01d5b8df0c431591bb9f34d20a0fe2fadb2ef6bedf729e7c7644723eba97d9afe8b238838a2aeb103dcb3fdbe2c978c79d88c970f16b8d7f815a802f951caf9d70cf77a08ea3ee54c32690d37b93a767b2dd241f99371b8398ec56f4d10a76702f788515894e3849a498ed", 0x78}, {&(0x7f0000000580)="2e2e4abc00dde591406accb5e30caaf15ca00c82e853716dd71c47cb72fd92d10ecfe10a8de331ff7c7af4429bedd1265b67907a0b0efa61ea7de2455275d3e1663e687f35d899fad86a3d7db09dfcdf26228fd40ddca4368ccb9e592df3f46751d7dca701c93787515144ae1a76666d9d90f31d883af788014e020ba0a0cf66265e8b43e276890a39b8bebba9718a", 0x8f}, {&(0x7f0000000640)="3e9e2dc4be2153b288fae4428d579b70df5e", 0x12}, {&(0x7f0000000700)="5aca43c2cba38d71e69d6701649eec38ea98", 0x12}, {&(0x7f0000000740)="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", 0xfc}, {&(0x7f0000000840)="7a9d7d10d690604afa7e9b6b941d74e2e9b19bf02576f2d9716f5f73a55a035a3e14bb74da9dc47b070b749df7eb2dc580fc34c63829ff558bc9790e46221c0a26f579f6ecc0c61c7ac692748baca4045453f77718e6bb8ec48c4a44db6677aed57a0bde3913638ecb0c7409a802b11c69507d8a864976cfbb228c4aac3fad69c13cb07e", 0x84}], 0x8, &(0x7f0000002880)=[{0xa0, 0x10b, 0x8, "c1f47ddce57dfc3950d1233476506e5f891970dcd767e9aaa4df8c0b02d4a346718c0c993778872cea4d49ffac9243186a27ed5a769a5cac22572c7224111795305f4f8d3db1014469abe1066df0cce699c3e2b4f1cf170b55e99adffbd429d580a899d3a3498c42a8cc32ca4f1ba26ee059d69d09fc40afeec53eafa2f59ef004ebae66837ed23475246ce2"}, {0xd0, 0x1, 0x35, "e8f869ad5e18bf03af9e1853eddc63a8cbca96f0a97327a9c2898c61a8085ebb74dbd4d98ae5e7adb4675f9453c12abb67fe7c0c4ea7a1e32e14368304d6876427b1d29c45e0f26755cab69044a26b6d1579f187595af628e363bb88051c603c86531dab1631d1d7a74676698701f28db347b178044db02fb4ccf8c75968ee3e162aa70b06c915798320d5df77de73ea88c5270f4ef423bc121d1d920cddba762eebd5378d2f14c72e0a815feae7b0826fd60a5b33f1bd02019c9c"}, {0x1010, 0x29, 0x6, "9a889872562848508d9dbe8e6556f71eb99f369ac48578d48e727cc16db48a31f89b6bf3f94c6bee666cd2ed985fe6f60d2b4a54d7e42a98e45cb8ee1c2bfeae175c91456405f68a676635f2aaa96e2704d74f43cd224f2cc86c42673f71c947b21eee139c474fb9b7e8ee15fa6239321f0e5f852bc43deff59ebba856d3939a803191537e1f3aac76dd48f6c39b562ca0a01f0622caa55455bfa976e2b370dcb41edbf35caa9be4885ba729b6959a40c82058c7519d32362fa47cb82027d25e1d09a103272ce4df83e72c7a895a050d83b49e90856259e94306aa805e926d2ac06a5e733a9da36608dc98dd03789715e5f6f05078ada3ff49c5990a03b91b75f627c64ac4f51979fbd1019bc9555388f3eaf7f8fb6f992527f487693244e202208d437c0b5091120b07faa8acbbfe89dd8bdf845d213ac66501c87e0ff08c591a1f42df843734b8d6965efd57c70d041c072877de27e7aa7c377e404893434e23d80124c375bb22cf11f9840f0ba39396cec15cf3f51decc3b4289e04c0a1e8d414ad508a1673a4727371f01e7b3f76ba00b41cd48036beaeac9930ef2d49b4445fa3cfa53b1e9230b868754078a31a50dcc79d7de80c44ede6161c058a6e2425b0ce0c2eb03186f75a5fe4b79c342106bfeccf185db0e8b60a4c542b5bf74bee751bf45b3bf39d8bae74c0f94f19c684b79341d7f525a98269181f302123ae47b7ce9896ee162b013c534d51b53220c2a7577b16bdbd73e1e91017c570605a5209637a18d14f10039bde0f2e595330f64349559a28e39eefc57d299482f28bb9f1530e8ede8025ae15833755194cbf4ad722437b214d89bc380ee22dac44a78cb4797e9f277774473bc5e3973fb1fdee5973c5a93c494a954bd36639993d9c2f01c1bba95fe4835896a1c1feeab6ae131f688535b5ae58012b618d1b1c2956d24b451821ca0b9d25e39f44da5e554d8c94a370f2f467e6ff721fa7e609bf56393eef64e4cca2c32ddbfb117f3ebd8e338535fad16c9f2625b303b6b74b36b55298126bef520a26c6fe010ff0828797eb0e7c3ebe018f485d35255673692ccde55faaefeb73daad042a93ceb4ca61ebcfa07e1f36c92446cf7df4737424134f2964aa7ea7fa9c405b0e649972cb7ee40ef199e9dd72bb9217ae1b3da29b83149b55b783f23d8eec7a87a280a12b97d882aa42cbbb32ddcaea472087f0708f42e71122e639959b495bbdd3d8388135379183ad75ee394c9f69cea4f7287942d28a31d67e163b4e555290f47f2138231a270e851edce42649852114b1b28a43d1ce55feedbd696d84ee6028b9542820455efac22440087488d4a324e7d71dac78268eb966e6ae1637f7f8f72fb38a9d5524fb9be35902b96577557affd1202692a2e0d5c0104411129a97a32131f7c1f0b507b4e7eb2511b8d3602ff13c3937cbf78fdd217adc94c001c5aa66ce16837ca9adfd27d8f8b8c7941a47985923ef869b9eadaccf67501ca02e62ac10a9451a0f1634c2db57e3534ba7638ff469166d592ae5f424d00f46418b6e158cbb6208cb2e968f7918e7115593a6d3a1c5d9df8f5042d8b9d15dde063e94723d229052ea3e8c38a4f6087d326bd5994999db8840f5fec5463d4a4f3a48ded2517caa3916d48671a7f9d93d1acfb9880114c3dc0c7a1d14fd5d09d45f095869cbfe4a8ea9f0987a0e0af22abdfc42566699cfadfad778624cb77dbcc39a86bb27891b9ad2995363a330f8ac82ca5e31c8f126cd57e6b645433e8512fb191778ea87ce39b10b660a75bf9c123dfc24be3d5b4d933cfb20d5b1f7c3369c72a4094f9287c3609a00cf15e1c29332216d916f8d6dbdbb9911e2f47abbe5a38f2bc6d617b1220cd1987e196f8e75cfa3e41af7475f97b221822315e57ea9524cb653127b00027bd669a4f6b4196c7c66e1e17fb9894868761e820254c5eb3ce8625b9e02b1a97f0d6f78a2de172c5cfbb209965072bab694bd34324137638b97044764c87de979dadedc3801d061fe5685816ed590468ece5878ae36e553c5bd505bb399ec45864f46d846db27f41b7f9049da5a4131a0cbd7d20faa534de790d57ad79cd06131a74c679b9856e68b6891af34695ba5cca918699ef1854b3c76497f69eb0b4edbdd04922969870b3310cac9022e589d8faff82374e2438b7266b679e75ea1ab8efe2060de267f98dac15a7b27fc0aad511901e77d2c18ba8b2a50211b0de391b8577d6be4addf323b1d8ffde6fda95403e191a8c32a81290d72c51611b938149f66086d49269e510a813df38c4947f79259f8e3818a741a3227ccaff8033633f5669df67abb1b5a068381bb7e8d894d472cba3fe0f2fab85bbfa8c3b2db6a81d0ea57998c1694820bee27f9b07b35d7145fcf03ad474811ec6c6b123dd1dd5c75255dd19096473be66b91f2208d787b96c92800aaa3ba2e32b0f2cd6c6aad2b702d037cc8182786b9bd2a1e14b2241156306d92a5e5e8902e6a3be22bdfa27179521abf63772fa01af6ff4b942cc818c9f8f102f0323de6148c7a95c74dbd018d282a072e670c0188b5bc1d12b60c9b8307606c175be24232607c81044296dd47a57ca41776d99b84ea5b181242da3b776e9dc0a96abfda4c53967a84b5375a5f69ec0767603dbe26323103715f4d7410bf3bba640c5d3bc4ae8b8d85140ca79192290ec5441da73ba0b83c3d65c0f2cd0648927036a1bfea324958d230af961fdfaad4ae6f68ca5c40daa00a11731ca3530e6d7e0bc0e6cfc2423974b17db1ad7d04c5b7c6b4c578cd4eeacbc61946d293a760255681832348c72ff5d236f7890541cadec1d0172ae5b9881edf2563c02d6136bd007cb31dbd048ee6919c9eeb350ca5947546e6e6b4eba9b7bb25313fd1cbc9f548cbf45e6b51b3e480724f6710d137dd18265966a4d554f0097e5dcc65fa3ab181b5f4915d3094b9e3183d43cf6efb046e426dabc30fb1eb5fe862865f0f1a969dc11612ce6ac4041e91b6187c01c62a3075f3eb161c99a8dd52c60a588d61e9abebb025dcab1962120bdb72311f1ae0e4a437fc1e29b28990c15ec19379a63bdefea9d18cc1d34a21f778494a712d405069dcdd792f30557b84b278b1886eff2f99753d2156ec5942261383acc057931d5cca680db5cf82bca80f0ba561854f2ce1e7ec447d46ed01fa0eac708a221b41b08707a50446bc7e1f7e23444522bdd97a2cd6d2a86c648961f64e17c6ee4c528288a245b6b5091c68b1febb39b9eddc87335252c6287b95179a569da35c5f3d83b260ef5d72405cfc09188f107bdb97465909587242bf9d34ef8ad0e1c353d8086eb1bc7b4446def46f6eb06213e1ecff70d7e6a63a908ed161b5a11e7292c53edc0d1119fef1cd365aaf097ff1f96816897f65ace4e665dfe0ee345fbcc8f6ac7366e1fabed06ead8fe2d29d3775c227d798789f2ef5206d08043d37911d147982932da5d415245c6fe6e70b1a98002bb52f73f4b4e58cd6e41c64b8f0ce3ceebfa86f24c74ca6b737d2bf662563f1592078f39a3be38f643aa234b426c96dd31d87a480bbacadf4c815f502fa58bc009ab950fdd7766b153e5ece18f39126a3d66cb172b37ed8a604495c8545f90c39524ae47e2b6687ce162f0280f080a2a1ff01a03c91ef94dbea2efdfdc9b3e0c0a7fb281e52447754860e595aef3dacae713ec3e19122e401f41cec069fc3cf8c262bb64a62d6e37ce0a47a56f78927d3e624c2905ef6b6bf1033816a14bb5eba9d475ec4fe7f641c9e6b81415c0a20c17d2e55b99cee65c3ac46e96f113e7deb3ed09775b3a2e8acf15f50cea2a6b730d29aa72a8b8edd83f4671358cd2fde2b8c50fdf2a9f2a7db75ece8ae354a0ef316cb4c0c9c923853e03caac6a19cb9ed139c538887da57812968f2d947090828553ea2a624cca5ee25ce1cdaef05c816a5a94878cadda4263e128622434bc199dd14e8815353fb1e8defe63c17232a9ce1f8c39dccf5a4eb29b00ab3186356d6a15fffb300e80f97d9bc9087d01d62898e437ee72a93e9a3885ab820190a6468c74d006edbd164f678cb547c17c8b7d88543e72f461a83db500ce3da53f146572e6be26b547f3f947a9cdd3444d4105b2538ebeb0bf30e5115add7ddca513f101b8ca5d1055b7b6d342e7bfc1df4517acbd5a197793a22544d7c27acc2ea46ec9dfa4cdcbc9197571aa2c164af8fa52808b841e2ba195f3f39968686ea936dbb389d6afbe47729028b7f6cdaa89d6198737b7731f302711842159b668f98492d54f5961258f588e764fc062a4e0930dfc0ceded19c443aadf26305adf7047f4aa9d34e1c8eef3a140d251ea1bb437676c951089d66df29df3af2a7d60b5412e944501d8be973addcbde8172f1709bc774f95f93b96904c4a390d70b7513df07f1032c43a93d787b1b87d5cb379d50bff21184ad7e546e6a25446e3470d3d6c8e4536b69aad1ec18724ac9128d3602a98a212e90ed2db4d55c37c1cceb4e676105cc6757cdaa0cff87f13aba090ab11e70b43abf7157daf027c8e886a3ac9a3c2b98eb732b95e3c17713a83c77092766c185345afb29f0e78fc95f9b8edd7638c4dcb499fd970d87073ba019a41484d0a039762687a4893c76d0cc0c9e4c85fdec7c835141f58c61e5e2b84aca40d8387fdeb6a49b440a27946b4cba9d0063a037a68f8695f7ac82e1506bbd3dcd62f0b9ba7c5f80f35cbaf00f5d353ecc9378c42165ea52f9e330a1be4b84972c542268698d8a46541f4d645b0c25e391f3211b5f13c1d073b7e721855e760bc1954962959aa8f1737fdc5c43fa0a0fe3b6fe9130a999d2be06473923a83fb6b38d94d8609d382905209ea382e60aa8c2a37ccf7a2c5eaf6e27326125404edeb17700454daad9f10c44457523834c4abf513d9340bb186c9797328cdd00aa033f2a22905a0bdfd4d3d398c235414d7b8b6eaa4d8fabf992ef1348814dac93d8dfe3288c538b65493e8c1ee1e4b97cbeb80596897a86867c4f6b6c8f5e808debd35422ab46860af4f42ac139b86d84696ebf920824ac727db4c97bc1b07187b39762f42bcbb4bb283bfb901c49c8da6664a9267a806a2aa6f3837562e6ccf7bf14d61aa08ba4851a8a1b7751fb74a47e2bbf2961b1caa3099ed2859d34cda11686afef3df94c2d86242e971d61e03df643b64fd697776397e524b0bebe2e15be375b2393a1ca8007d54c09f653a118f507e221d9ea394bdf53d2ec7d3505e77b448a18661f1dd5c7b432cad33820c562bdc968036181541779875fdd5afecad9ab7f435f27ee397cdaf1cc86eb11818de9f80e860bc3b6b1b0ec45e39b57de838e24f8cb7c20991757c47f80530a87e24030e8e4f3ab590f562e04102caec2876fd6864ac42a07ee574f933567e5343a861f7fcb96c9b190d8c591d4e1e4d48d80c581174c8f979c6e9c4945114c006529c027c0e055b25235c302dbbc536cfefb45495ff0a6f1df30300a462ef36b444502c28723ecf68aa6ebf16a1a463ef546543f08286665f713c676e0d9ef6aa17a26e795bd8fe22522a71ff7891f1e0b6934600a52f70856e49014c00be36cd251b01f44f99c1d79fb05fdb831e83845493a4a8b57648fafeea14747796ae9897e65957789e0fe597f9b645031be3c9707f73bfdae1a72d79755d3a3d754feae80aa007408c1c0e773123af03f2ad8451b7ed07f2343fcbbd25f9fd8d995f09126fae472e7cac0074e9a2594d0a1e949594076269fddac55439ba3379368e971d8ad79c705ec969f8589cc603"}, {0x88, 0x29, 0x8, "69e95747187d7262f606fec2b1300b3362286bfb72d86e1b524e048525c7b5c45aee0de54a4f785391224f481deb3d67723314a9cbf68d6bcef3e9877be191d3ed1eaa56815a9d79eafada4e86c63a49ad41ab09f8837626192f2146e52a34a78b81e20c2b369b0538582a48fbef0747d9dfbea5a030b9"}, {0x38, 0x11b, 0xfffffffffffffffe, "7f92ce666640462abfc460a7e2e82644e7c051a7160395d939eb3b777227816b8c6306fb4705"}], 0x1240}, 0x4040004) sendmsg$kcm(r0, &(0x7f0000002840)={&(0x7f0000002080)=@can={0x1d, r3}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000002100)="1fb1adfd459d934810d94fd4b2f08a2b60eae9c6f15965fbda7dbb940159341648ba61e997f1e54aa289535621a5c99d0d7c1a3ff28afe253c5a6a6c3c0a0dd22496d1375685017a088efd2b2eaa96f15744768881b063fd78702252258eae0ffcdbbfdc14ce65469921bbd59254e0ad85d0f648c5717ea77b6adf82b725d2", 0x7f}, {&(0x7f0000002180)="44bd38205436cc24691f491ee95219a45938ce8866b786ba720f374a24aa55a3b4e05e561ecc85c9c6c3bdb1bdfc8e3e8157e268c26107f804e1c2692b8e6a6efbaa421f23fdd2f36b79a52d8eb7e5e8b655bc6fca189dd2b06c6ec886e1298a02e8b6ebd2e5f2afdeba357cafde718c8bc929d2e79c90f0eeae913483f31db575abfa4f7de8e2583a7c70167381c1470b1eb310f0a5bebe9dcea0aa", 0x9c}, {&(0x7f0000002240)="d393b4fd91d9fe2a55c979c294e62f7e4993af822e03072f3be820760f17bf0e03e262996d1a4e97ddf11e8c056b3a1227a17b0c491b23fffc2382c068c4447aca55", 0x42}, {&(0x7f00000022c0)="63f3d390e0c775ae3c43d783700655922ad3c4aceb9b", 0x16}, {&(0x7f0000002300)="954aecdefb2c215d342954064fae3f67e4747f5e187992554d35dcbbf1d176089a407972601aedc134bb491a83dc7475fd92b737973f7d855aeb8ed77e", 0x3d}, {&(0x7f0000002340)="68752c28f60f39e7a1eeb870b530fea1dd14b02f77262002a1157472ba7acefb61b341019ff8625f82ee717863", 0x2d}, {&(0x7f0000002380)="4ad75d69e2b2f36a9ab461879c8e026cd12623a4d828275a209a0a564afc8ed9ea1ae7", 0x23}, {&(0x7f00000023c0)="48647fb5e6386d949648b08258205a159e5c37ffcf1be747fd6f1ea0272ad55a33e1287749539f61221fc90c3cd081d97cd693071445d872c778b8b13ed1ff188c634d098737746ade848aebbf25e6189f922cfc4fd1d5734b94242e649047aa3a113d708e24e120aac485fe386c08f73a", 0x71}, {&(0x7f0000002440)="18030d40d1054b11642bd1852a479a8f94c0435abc128b7a46b7b59e7b0c5ddb3307ea9b686760dfb702f4117eea3aa5de9b3f128a8471d952934b66a4c31e7ca66369d3b284b2386b74ee688de0630bce3b27db03d73879586d67977b", 0x5d}, {&(0x7f00000024c0)="7e93bbd9642015060d7ad0285e19e63c6080afaee36779ed8b3dc739d0bfef637b25454e4bfffa10a77b8741eb8961189feb19b3271d43581591465294453772205fde9a224e2d9938addcc9e0b7fa0aaf3c8aafcede98a9a210e1c02c19d3d75603891b100191559706f954c1196784f6c2d60cf5bb966e27eacc4e957545a54404a78ade5f45d2f6ded8f6094450ea9a1e727f66eed6f8c2188dd883383b933a08e67507d943cf91e8ee37fa420c084538791d5891134ff3c7c53e9f79df7881b34d48c5", 0xc5}], 0xa, &(0x7f0000002680)=[{0x70, 0x11f, 0x1, "ace22a3508d70a7471bdca85a511ee4fce5bf54958e8de907887cb68416bd11047cf9e1766a010c6c20ab7121ee96742e74bb7d771e7faecc88cab816f6532e1ff618f796d95bdea92d52f57e45c2424e1f93124237c44be2baa7e3bf9f61c"}, {0x68, 0x11e, 0xec99, "0431f3888db86755355babe4dbdaac9584026f9ad8a53e2862a66c8313fb47d318b5f51285c3d42bc6ce355ff2918c88e227b4f9702e21aee1b371db41bf64e5dfd57e715a5c14b3152b2bdeb1983ed28ee29df250"}, {0xc0, 0x19f, 0x1000000000000000, "84e7da690995d0e680a013c16a0d8e4a204d1dab419610425221f2df52a2ec8266aff51d2bcc50e2e4d802da6390e59b5b2bd42913e683db47ba7cb2111bb2e24cee67c6bcb2d4cc9461525023bb5cd59fce76823cd75b5833cae9eccb5760529f785578a679ce62926f8d1062074aa4c0b26b0acd9a41de18916d7f13a82438b3cb96f7e7a895ba4bc470892107dda751e1a5cca9a12eece19b270718a08c984655b1301fee8e7e8a61ef2533bf24fb"}, {0x20, 0x104, 0x1, "e96b0003580f9f07ec32c2dfaf4c05"}], 0x1b8, 0x20000010}, 0x4000000) 12:06:48 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:48 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x180000000000600a, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000400000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f6367726f75702f73797a3100f820ae3eb98d93ab4f6dd661c114b2edb4ff20c4454a9c4c9fb5bca8b393278ac82ae5d9fa75fb25c2c5a96e0f0086ff40ef9bcccf776dcea50592bfe8226a118098dee8662efd3615cecc3a3cb624544d619a1f4126186789a33a43bdbc7657ec2d1d2fddbd9e38011a08b037bb4113f1ce5387137cc01db6ccacce4326a859b1c09c96c00c38c54d53af7569219d124601cda623cec998cb2a94d5e74bd6ba7343cf579b8fc22d17734697cde94e8ea2efe1cb60b3fb", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) 12:06:49 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:49 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000500000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:49 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006005, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) socketpair(0x11, 0x6, 0x4, &(0x7f0000000000)) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:49 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00003000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x80000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000300)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000940)="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") socketpair(0x0, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bcsh0\x00'}) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000072c0)) r5 = socket$kcm(0x29, 0x402000000, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000080)='./file0\x00', 0x4) perf_event_open$cgroup(&(0x7f0000001640)={0x0, 0x70, 0x6000000, 0x80000001, 0x7, 0x0, 0x0, 0x7, 0x1, 0x1, 0x5, 0x8, 0x10000, 0x6, 0x7, 0x0, 0x1, 0xfffffffffffffffd, 0x2, 0xffffffff, 0x9, 0x0, 0x10000, 0x9, 0xffff, 0x4, 0x4, 0x4, 0x7, 0xffffffff00000001, 0x80000001, 0x3, 0x5, 0x943f, 0x1000000000000, 0x8000, 0x537d, 0x80000000, 0x0, 0x50d8, 0x5, @perf_config_ext={0x2, 0x16}, 0xc, 0x81, 0x80000001, 0x7, 0xfffffffffffffbff, 0x8, 0xfffffffffffffff9}, r1, 0xe, r3, 0xe0ed1651d4d37b27) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r5, &(0x7f0000000540)={&(0x7f0000000340)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e24}, 0x3, 0x4, 0x4, 0x1}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000800)}], 0x1, &(0x7f0000002e80)}, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001580)={0x0, r0, 0xffffffffffffffff, 0x2}, 0xfffffffffffffec5) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r4, 0x50, &(0x7f0000000e00)}, 0x10) socketpair(0x0, 0x0, 0x5, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000340)='./file0\x00', 0x0, 0x10}, 0x10) openat$cgroup_ro(r2, &(0x7f0000001700)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000001740)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) recvmsg$kcm(r8, &(0x7f0000001500)={&(0x7f0000000380)=@can, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/124, 0x7c}], 0x1, &(0x7f0000000500)=""/4096, 0x1000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0xa, 0x200000000000023c, &(0x7f0000001600)=@raw=[@jmp={0x5, 0x0, 0xf, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}], &(0x7f0000000300)="00100000", 0x104, 0x1a, &(0x7f00000015c0)=""/26, 0x41000, 0x405, [], 0x0, 0x9}, 0x89) 12:06:50 executing program 3: r0 = socket$kcm(0x29, 0x7, 0x0) socketpair(0x15, 0x0, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r1, &(0x7f0000000040)="cc179ad91f205518a5c8e989a5552dce2f96187f3bc12cce5a7cc89354db7649d34fcedc10ea65ed7b0391f3b34463f7b3bb065d5743d7d9f564540b1f258aba97e83e87c0816f2cd9f1b9eb4ac3b5f9092fd82bb1014a2483ec386d25509060f53b2cea6bda4d0d2ef493a8b19ea6ec1bef080f53ff3fa831629c9114c4ea0ee09832e592b6026ddf254991a198997fce4e", &(0x7f0000000100)="4f8dbfc9e08f52b4f6078bae5ed603de1d529d1c793a15ad03d3741b2db6d32fc8d3db8e22246314639da604", 0x2}, 0x20) socketpair(0x1f, 0x5, 0x1000, &(0x7f00000001c0)) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) sendmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000240)=@sco={0x1f, {0x86d, 0x0, 0xfff, 0xa02, 0xe3, 0x6}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000002c0)="80efed57e2865d8ef96cdbe67ce73b8782c9f87577007ef1394d3facdcb59c10d16b8445d22b6de03a3ca74ce85f4b06cc0b7878a67693fe57dd84d25abe05ab76464946b2e1dc3551165f362bc7b63a52bbdbd4fa25689ac011fd9b87e6f8ba2d3dde473168cb507a0e622df9cd05d3dd1bd469c883d55e5410d6bb7cc6270a0d2cf7", 0x83}, {&(0x7f0000000380)="03ebb2489fa02d2a8bf19a12bbd346e6e4f12a7ccecced5369efd40ba1db75d4d97e843bb84b0743d3b199fe1ac27e948929ab5294ac4734ee7fa990490113e3cf256afadfdba7e846d0d489fdd9fb998a4a4d7839e0c94763ca0f7c298e0da6f0929413c745e3232b602aa8c232cbeb5b03229b56e31efc21a11f66e8ef4efb92947b5ef5c2897fe8274880efdb46bfa97a75fbf47a937f", 0x98}, {&(0x7f0000000440)="71a7ea7b757b2046531b22411205668b448cd0bc8edd2173065442260780a01f72d462014cccc1cd87739c51967f3179d0c212d906bd527f25662e123bb21c27cebe6cc7ae6acc9174cc04f9de2ad09323a23253508d560a12f7a0b5ba4f7400b60c8e5413478b585e40afe62dc7712e90192f3820e9934ca883cb8a9805d9ffc9074f7bf8858bdd456bd6db4152", 0x8e}], 0x3, &(0x7f0000000540)=[{0x30, 0x1ff, 0x400, "792364541f2d23a87aa13da473847c3e7270d954c7d9d6b11958b6de8506"}, {0x70, 0x0, 0x2, "be68a5efb4f81037a69e9e4ef222098e3899193e7271ee5fe221fcc2e60c4ad6dd5b9ebb7a0215efbe09068528a67c3de5b415fc3ef99f7625875a3ca7c3f0dcf4fe4d4233ffdbc8c105ea59a5ade9480e9ce4b3091512e4e4b4bffc42"}, {0x38, 0x0, 0x7f, "62fdd5ac65c945e94aeb487dffc71900216628a4993795b6be5a0be2154ec334e52043366d46"}, {0x78, 0x0, 0xdab4, "745ec031c792b25fdf0000c01c80782fb204e8129f68dc309b6debd83db878d6cb1115553aaaacdeae9341d25794da9d0274e492459cdbe1f3bdd4fc7fe7764d9fa638da14d2ef93cdb8356dd7f0f3e2ece7297e82337e351d03cc7e91a8353d6b7157b38c1f50b9"}], 0x150}, 0xc000) openat$cgroup_subtree(r2, &(0x7f0000000180)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) 12:06:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006009, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:50 executing program 1: socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b706d247ffffffff2d6405000000000065040400010000000404000001007d60b703000000000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000fffffffe00ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:50 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:50 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x2, 0x0) close(r1) socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000100)="c6", 0x1}], 0x1, &(0x7f0000000900)}, 0x41) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 12:06:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006030, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:50 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000003e00ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000000c0)=0x1) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./c5roup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r1, 0xf, 0x3}, 0x10) r2 = openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:51 executing program 5: r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r1, 0xa, 0x1, 0x0, &(0x7f0000000000), 0x8e}, 0x20) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000008c40)={&(0x7f0000008980)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000008b00)=[{&(0x7f0000008a00)=""/112, 0x70}, {&(0x7f0000008a80)=""/97, 0x61}], 0x2, &(0x7f0000008b40)=""/241, 0xf1, 0x4}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r2, &(0x7f0000000100)="ab03d17b18a9bbc636f44b26b33ea6a8924e2b8f56157b675a54ec18c478277601f31205a6eb67cfc0861504cbb0f3dfe6ae42d66fc7db5b4eb574d5ea911d66b0ef811f32e36b16349f675796e9b6e0aea934ece1509a9e6dcdca5b1f08", &(0x7f00000001c0)=""/33}, 0x18) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000008c80)=r3) 12:06:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000018000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000000, 0x130, 0x29, &(0x7f0000000940)="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", &(0x7f0000000400)=""/41, 0x100}, 0x28) 12:06:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) 12:06:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006004, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='io.max\x00', 0x2, 0x0) 12:06:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0xd, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000003f000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:51 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:51 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="1b000000540081aee4056c00000f00fe078bc36f1600000063dac3", 0x1b}], 0x1, &(0x7f0000000040)}, 0x0) 12:06:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0xe80, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000f0ffff00ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x2, 0x70, 0x0, 0x0, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x1, 0x0, 0x3e5c, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x0, 0x8000}, 0x0, 0x1, 0x9af1, 0x0, 0x0, 0x9}, 0x0, 0x2, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuset.effective_cpus\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r1, &(0x7f0000000400)="6d8de01cd648413b42d4e8b8e602cd99662f085e89525ca295d3f74bd7816a24814f8bedfdfa3e52c6d9e8f7c31b74b42ba7bd132d40", &(0x7f0000000940)=""/242}, 0x18) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000740)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f6e65742f74756eff", 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000340)) openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080)='threaded\x00', 0xffffffba) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x50, &(0x7f00000007c0)}, 0x10) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r1, r1, 0xf, 0x2}, 0x10) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x24800, 0x0) close(r0) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000004c0), &(0x7f00000005c0)=""/190}, 0x18) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000100)='\x00'}, 0x10) r3 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x8d, 0x80000201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x80000000009) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x297ef) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000002c0)={0x1, 0x5, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @empty, @random="997651121475", @broadcast, @broadcast]}) 12:06:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000180)=""/18, 0x12}, {&(0x7f0000000240)=""/193, 0xc1}, {&(0x7f0000000340)=""/168, 0xa8}, {&(0x7f00000001c0)=""/7, 0x7}, {&(0x7f0000000400)=""/252, 0xfc}], 0x5, 0x0, 0x0, 0x2}, 0x40002121) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@generic={0x8000, 0x1, 0x0, 0x1, 0x4}, @alu={0x7, 0x9, 0x0, 0x7, 0xa, 0x0, 0xfffffffffffffff4}, @alu={0x78f93fe5b460fd11, 0x200, 0x0, 0xf, 0xe, 0xfffffffffffffff2, 0xfffffffffffffff0}, @ldst={0x1, 0x3, 0x1, 0xf, 0xb, 0xffffffffffffffff, 0x1}, @ldst={0x3, 0x3, 0x7, 0xa, 0xb, 0xfffffffffffffff4, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xffff}, @exit, @jmp={0x5, 0x2, 0x3, 0x7, 0xf, 0x30, 0xffffffffffffffff}]}, &(0x7f0000000000)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x1, [], r1, 0xf}, 0x48) 12:06:51 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:51 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0xf754, 0x8, 0x2, 0x2, 0x0, 0x7aa0, 0x20100, 0x1, 0x0, 0x3, 0x3, 0x6, 0x6, 0xefc0000000, 0x0, 0x4, 0xec, 0x80, 0x80000000, 0x3, 0x7, 0xd1, 0xff, 0x9, 0x6, 0x15, 0x4, 0x9, 0xffffffff, 0x10001, 0x80000000, 0xfffffffffffffffe, 0x20, 0x2, 0x0, 0x9, 0x0, 0x5, 0x1, @perf_config_ext={0x9, 0x400}, 0x400, 0x5, 0x80, 0x7, 0x7, 0x1, 0xd6b}, r2, 0xf, r1, 0x8) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:51 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000008000a000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x2000028c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x2000128c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 414.193731] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 414.217081] PF_BRIDGE: br_mdb_parse() with non-bridge 12:06:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xfffffffffffffefe, &(0x7f0000000040)}, 0xffffffffffffff8c) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)="2f02726f0500000074617000895059372f9199aa53f0bb5cf7b64cb7336b650264b1f1f81db62cc9399668f301b3668ad02b47dd439dcf453f1bceff3b4f5a2745f5", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r1}) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='memory.swap.current\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000000080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ipddp0\x00', 0x100}) getpid() socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r3, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x6f59, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\vF'], 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x8, 0x40, 0x7ff, 0x0, 0x0, 0x8c, 0x2d00, 0x1, 0x4, 0x0, 0x1, 0x3, 0x3, 0x7f, 0x7f, 0x5, 0x2, 0x2bc47c5d, 0x100, 0x0, 0x7f000000, 0x46c, 0x3, 0x2, 0x1, 0x9, 0x6, 0x1, 0x7, 0x1, 0x33b7, 0x8, 0x2, 0x4, 0xff, 0x9, 0x0, 0x10000, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x40, 0x9495, 0x401, 0x8, 0x2, 0x3ff, 0x1f}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000200)="d5a4a303cd95d88abe27bd7c0ebc765b10cfe581780af8a550d7255bcaac814107093d9d934a0bcd26dfeacef88ae0fbfc653f0d8cffbf9151092ac3f5ad4f284645892dec268422a6d366f567d3a75683ec4ed47624593693deda5c0f02f7672cf81a6b8dcaed1223ed38218349abfdc8b11eac11268df53316ed7d2a4e7c40e4e94fae7f8438e2cc9bf5392b024859f0c338b7e0542cd6b7f12a9e8c248857149fd055599371b0d770", 0x2}, 0x20) 12:06:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000400ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90803e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") socketpair(0x18, 0xa, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/16}, 0x18) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) close(r1) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000580)='./file0\x00', 0x0, 0x18}, 0x10) recvmsg(0xffffffffffffff9c, &(0x7f000000bdc0)={&(0x7f000000a900)=@can={0x1d, 0x0}, 0x80, &(0x7f000000bd40)=[{&(0x7f000000a980)=""/4096, 0x1000}, {&(0x7f000000b980)=""/54, 0x36}, {&(0x7f000000ba40)=""/226, 0xe2}, {&(0x7f000000bb40)=""/251, 0xfb}, {&(0x7f000000bc40)=""/97, 0x61}, {&(0x7f000000bcc0)=""/81, 0x51}], 0x6, 0x0, 0x0, 0x1f}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000940)='/dev/net/tun\x00', 0x100, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000be00)={0x17, 0x10, &(0x7f00000006c0)=ANY=[@ANYBLOB="00000000000500f6e3572f0006000000000000000000000095040015000000101535607413b42d18540aa275fb0100010000000000cda851f4326ca7cbe12f904200eb9fa1a51e606363fc84a8fbab0b6fae48f1712136265d5a6246002475c014a2cb7a3fefe002b895697a45c1455b4924fc3c4ec454196a4fb54b12d6c863181c6c9dfc951b17357858541ba1df411f372e9416a9041239e6fcd2d4270c7fddfaf97652eb65cce3be4a0220ef847e7847af39487e0095d7376dc723f6bebbcc8437ac452ac0181e509451868899bfb9710f3512ea5e"], &(0x7f0000000640)='syzkaller\x00', 0x206, 0x70, &(0x7f0000000a00)=""/112, 0x41100, 0x0, [], r5, 0x4}, 0x48) r6 = gettid() perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x4, 0xfffffffffffffff9, 0x1, 0x8000, 0x0, 0x10001, 0x600, 0x8, 0x7, 0x3, 0x1, 0x1, 0x5, 0x4, 0x20, 0xebf, 0x5a, 0x1, 0xaa1, 0x40, 0x1, 0x8, 0x6, 0x5, 0x192a, 0x100000000, 0xc1, 0x0, 0xce8, 0x0, 0x3, 0xfffffffffffff3c6, 0x20, 0x3, 0x0, 0xd82, 0x0, 0x1f, 0x0, @perf_config_ext={0x1, 0x5}, 0x0, 0x3, 0x0, 0x0, 0x7, 0x3, 0x83}, r6, 0x1, r4, 0xb) r7 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000480)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000080)=""/37, 0x25}, {&(0x7f0000000500)=""/116, 0x74}, {&(0x7f00000007c0)=""/84, 0x54}, {&(0x7f0000000840)=""/156, 0x9c}], 0x4, &(0x7f0000000280)=""/46, 0x2e, 0x4}, 0x1) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(r9, &(0x7f0000000a80)={&(0x7f0000000980)=@pppol2tpin6={0x18, 0x1, {0x0, r7, 0x0, 0x0, 0x0, 0x4, {0xa, 0x4e20, 0x8, @mcast1}}}, 0x80, &(0x7f0000000a40)}, 0x80) ioctl$TUNSETLINK(r8, 0x400454cd, 0x308) 12:06:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0xa, 0x0, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 12:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90903e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000100ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000001800ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90705e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) recvmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@l2, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/216, 0xd8}, {&(0x7f0000000280)=""/228, 0xe4}, {&(0x7f0000000380)=""/241, 0xf1}, {&(0x7f00000001c0)=""/42, 0x2a}], 0x4, &(0x7f00000004c0)=""/221, 0xdd, 0x2a6fafb6}, 0x100) r2 = openat$cgroup_ro(r0, &(0x7f0000000600)='pids.current\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000640)=r2, 0x4) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90708e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)="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", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 12:06:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000700ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90709e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xfffffffffffffefe, &(0x7f0000000040)}, 0xffffffffffffff8c) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)="2f02726f0500000074617000895059372f9199aa53f0bb5cf7b64cb7336b650264b1f1f81db62cc9399668f301b3668ad02b47dd439dcf453f1bceff3b4f5a2745f5", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000080)={r1}) r2 = openat$cgroup_ro(r1, &(0x7f0000000200)='memory.swap.current\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000000)=ANY=[@ANYBLOB="800000000000000000000080"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0185879, 0x20000000) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ipddp0\x00', 0x100}) getpid() socketpair(0x0, 0x0, 0x0, &(0x7f0000000280)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000540)={r3, r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x6f59, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[@ANYBLOB='\vF'], 0x1) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x8, 0x40, 0x7ff, 0x0, 0x0, 0x8c, 0x2d00, 0x1, 0x4, 0x0, 0x1, 0x3, 0x3, 0x7f, 0x7f, 0x5, 0x2, 0x2bc47c5d, 0x100, 0x0, 0x7f000000, 0x46c, 0x3, 0x2, 0x1, 0x9, 0x6, 0x1, 0x7, 0x1, 0x33b7, 0x8, 0x2, 0x4, 0xff, 0x9, 0x0, 0x10000, 0x0, @perf_config_ext={0x9, 0xffffffff}, 0x40, 0x9495, 0x401, 0x8, 0x2, 0x3ff, 0x1f}, 0x0, 0x0, 0xffffffffffffff9c, 0x2) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0), &(0x7f0000000200)="d5a4a303cd95d88abe27bd7c0ebc765b10cfe581780af8a550d7255bcaac814107093d9d934a0bcd26dfeacef88ae0fbfc653f0d8cffbf9151092ac3f5ad4f284645892dec268422a6d366f567d3a75683ec4ed47624593693deda5c0f02f7672cf81a6b8dcaed1223ed38218349abfdc8b11eac11268df53316ed7d2a4e7c40e4e94fae7f8438e2cc9bf5392b024859f0c338b7e0542cd6b7f12a9e8c248857149fd055599371b0d770", 0x2}, 0x20) 12:06:53 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}}, 0x0, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/net/tun\x00', 0x408, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)=""/47, 0x2f}, {&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}], 0x3, &(0x7f0000001840)=""/33, 0x21}, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r5) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001980)={&(0x7f0000001900)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x2e9, &(0x7f0000000480)}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0xa, 0x100010000000006, 0x0) sendmsg$kcm(r6, &(0x7f0000000c40)={&(0x7f0000000600)=@llc={0x1a, 0x201, 0x100, 0x4, 0xff, 0x8, @broadcast}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000680)}, {&(0x7f0000000940)="d1c5a499c6ad387e23a33e8a9f68ad102fad8c96be671ffba74a1294a7cd88bec758da581dea9ae2701c5b2097effdb12e8e74c09a050766d14baa53c06f711d8e60f2d14f4cfdfe908d9af6cc99f88f3c0e60e814b6d67e9eda0ed4215580f3c901e263155122ff60d6430666eee30ed9cfc8bc767b16b59614dc1cf399f847c3528753d029b81c6539508929776ef93248b0602a0bf603d1f8cb684ddaa6b96797dbbf616b42a50cb241c993cbd3a94c4a5210afcbeebd7eba90d7d13554cfb36a547913d2bbd6c0f24e2d4eb5bd2bf42770f039659ce1c99f5e5368ab0bacc2f4"}], 0x0, &(0x7f00000007c0)=[{0x38, 0x18f, 0xfffffffffffffffd, "fd25a0cbb413bd261ff9a49faaf11933ea93f95e9e97947ce59f1539c1470d418227ab2f"}, {0xb0, 0x10f, 0xfffffffffffffc01, "83a8fc9993f7541d27f747ddb044d4e0839367e3c1e0df20acb7164443c382e6326ff1c086b8626b2ef15d2e6f9d480b65ea8531f2f1eb78b88a7eda942961b2398df4246f2a6b1b626caa7976aeb4d76deee36e05f329410c369dabec59920a410ef19809524b71f5f36c6b2217d30a789fe61e069f9c43dc9d6c40d6c8cf1ce956ad11fad63bdd69e787952f10b2cb51417a067e156c3e2a5f4f38837141a623"}], 0xfffffc35}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x9, 0x18}, 0x100000261) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000001940)) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x4}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 12:06:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="2e2f6367626f75702f73797a738e", 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000000c0)) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='rdma.max\x00', 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000180)) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) 12:06:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90702e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000003000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x4b7, 0x7, 0xff, 0x9, 0x0, 0x400, 0x40, 0x8, 0x1f, 0xffffffffffffffc0, 0x1ff, 0x77, 0x7fff, 0xce, 0x40, 0x3, 0x6, 0x8, 0x0, 0x0, 0x884, 0x8ff6, 0x1f, 0x401, 0x7fffffff, 0x0, 0x3f, 0x5b4, 0x5, 0x57d, 0x1, 0xff, 0x7ea, 0x1ff, 0xa9, 0x0, 0x0, 0xfffffffffffff001, 0x2, @perf_config_ext={0x8, 0x7f}, 0x0, 0x9, 0x8, 0x0, 0x44, 0x10000000, 0x80000001}, 0x0, 0x9, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x3, 0x0, [0x0, 0x0, 0x0]}) [ 415.610739] device nr0 entered promiscuous mode 12:06:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000feffffff00ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000004000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000000)='./cgroup\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000100)) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(0xffffffffffffffff) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:53 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000140)='cgroup.stat\x00'}, 0x30) perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x1ff, 0x2, 0x101, 0x5, 0x0, 0x6, 0x2000, 0x5, 0x7, 0x12850f85, 0x2, 0x1ac0000, 0x4, 0x8, 0x101, 0x1, 0x2a8, 0x8, 0xffff, 0x3, 0xfffffffffffffffd, 0x3, 0x81, 0x6, 0xbea5, 0xd01e, 0xff, 0x1, 0x100000001, 0x7, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0x4c975a44, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x200, 0x0, 0x2, 0x0, 0x81, 0xffffffff, 0x81}, r0, 0x3, r1, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) 12:06:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00f0ffff000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:54 executing program 5: close(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x2, &(0x7f0000000000)) gettid() perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x1c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40286608, 0x20000001) [ 416.325646] EXT4-fs warning (device sda1): verify_group_input:123: Last group not full 12:06:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}}, 0x0, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/net/tun\x00', 0x408, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x100, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000540)=""/47, 0x2f}, {&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}], 0x3, &(0x7f0000001840)=""/33, 0x21}, 0x0) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r5) socket$kcm(0x2, 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800"}) close(0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="2e2f6367726f75702e6e65742f73797a31eb", 0x1ff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001980)={&(0x7f0000001900)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x2e9, &(0x7f0000000480)}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0xa, 0x100010000000006, 0x0) sendmsg$kcm(r6, &(0x7f0000000c40)={&(0x7f0000000600)=@llc={0x1a, 0x201, 0x100, 0x4, 0xff, 0x8, @broadcast}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000680)}, {&(0x7f0000000940)="d1c5a499c6ad387e23a33e8a9f68ad102fad8c96be671ffba74a1294a7cd88bec758da581dea9ae2701c5b2097effdb12e8e74c09a050766d14baa53c06f711d8e60f2d14f4cfdfe908d9af6cc99f88f3c0e60e814b6d67e9eda0ed4215580f3c901e263155122ff60d6430666eee30ed9cfc8bc767b16b59614dc1cf399f847c3528753d029b81c6539508929776ef93248b0602a0bf603d1f8cb684ddaa6b96797dbbf616b42a50cb241c993cbd3a94c4a5210afcbeebd7eba90d7d13554cfb36a547913d2bbd6c0f24e2d4eb5bd2bf42770f039659ce1c99f5e5368ab0bacc2f4"}], 0x0, &(0x7f00000007c0)=[{0x38, 0x18f, 0xfffffffffffffffd, "fd25a0cbb413bd261ff9a49faaf11933ea93f95e9e97947ce59f1539c1470d418227ab2f"}, {0xb0, 0x10f, 0xfffffffffffffc01, "83a8fc9993f7541d27f747ddb044d4e0839367e3c1e0df20acb7164443c382e6326ff1c086b8626b2ef15d2e6f9d480b65ea8531f2f1eb78b88a7eda942961b2398df4246f2a6b1b626caa7976aeb4d76deee36e05f329410c369dabec59920a410ef19809524b71f5f36c6b2217d30a789fe61e069f9c43dc9d6c40d6c8cf1ce956ad11fad63bdd69e787952f10b2cb51417a067e156c3e2a5f4f38837141a623"}], 0xfffffc35}, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x9, 0x18}, 0x100000261) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000001940)) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x4}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x200002, 0x0) 12:06:54 executing program 5: perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001b40)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001dc0)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 12:06:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000008001a000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:54 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:54 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b60000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:54 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:54 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0xc, 0x80007, 0xc8, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x1, 0x5, [@local, @remote, @broadcast, @dev={[], 0xf}, @link_local]}) 12:06:54 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000060000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:54 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000f0000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:54 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socket$kcm(0x29, 0x5, 0x0) 12:06:54 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 416.856694] device nr0 entered promiscuous mode 12:06:54 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b18000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:55 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x20c200, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'team0\x00', @random="4e38a6a72af2"}) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000000c0)) socketpair(0x2, 0x80002, 0x7ffffffd, &(0x7f0000000000)) 12:06:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000a000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b09000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:55 executing program 1: r0 = socket$kcm(0xa, 0x0, 0x11) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(r0, 0x88, 0x64, &(0x7f00000001c0), 0xfeb8) close(0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)="2f6465762f6e65742f74756eff", 0x241, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$kcm(0x2b, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000000c0)) sendmsg$kcm(r3, &(0x7f0000003600)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f00000012c0), 0x0, &(0x7f0000001340)=ANY=[]}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x894b, 0x0) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000280)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r1, 0x4) r5 = socket$kcm(0x29, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001ac0)={&(0x7f0000001a40)='./file0\x00', 0x0, 0x8}, 0x10) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0xffffffba) close(r1) recvmsg(r5, &(0x7f0000001680)={&(0x7f0000000380)=@can, 0x80, &(0x7f0000001600)=[{&(0x7f0000000440)=""/37, 0x25}, {&(0x7f0000000540)=""/147, 0x93}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x3, &(0x7f0000001640)=""/33, 0x21}, 0x2) 12:06:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:55 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f00000011c0)=@nl=@unspec, 0x80, &(0x7f00000026c0)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/4096, 0x1000}], 0x2, &(0x7f0000001580)=""/55, 0x37}, 0x0) socketpair$unix(0x1, 0x20000000000, 0x0, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0xf, &(0x7f0000000080)='bridge_slave_0\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='bridge_slave_0\x00') r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x5, 0x3, 0x0, 0x8, 0x0, 0x5, 0x80000, 0x2, 0x3, 0x5, 0x4, 0x8, 0xa426, 0x274, 0x4, 0x5, 0x6067, 0x8, 0x101, 0x7, 0x1, 0x401, 0x7, 0xffffffffffffffc6, 0x10000, 0x400, 0xb01, 0x8, 0x1, 0x1ab, 0x1, 0x5, 0x400, 0x4, 0xb988, 0xffffffff, 0x0, 0xfffffffffffffff8, 0x0, @perf_config_ext={0x75e4, 0x1}, 0x1000, 0x9, 0x10000000000, 0x0, 0x9, 0x200, 0x3}, r0, 0x4, r2, 0x9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000040)={'bridge_slave_0\x00', @random="01003a1e2410"}) 12:06:55 executing program 3: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x3, 0x0, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={r1, r2, 0x0, 0x1}, 0x10) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='./cgroup\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe8b6) 12:06:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000060000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b3e000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:55 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2ee7700d923ae95c2ff32f6367726f757000", 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x3, 0x1, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000200)) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x7, 0x70, 0x9f6e, 0x0, 0x7, 0x6, 0x0, 0x2, 0x4, 0x8, 0x100000000, 0x4, 0x5, 0x0, 0x7f, 0x2, 0xfffffffffffeffff, 0x3, 0x29, 0x8001, 0x0, 0xfffffffffffffff8, 0x4, 0x3f, 0x3, 0x6, 0x9, 0x200000004000000, 0x3, 0xfffffffffffffff8, 0x400, 0xfb1e, 0x0, 0x4, 0x2, 0x2, 0x7ff, 0x101, 0x0, 0xff, 0x2, @perf_bp={&(0x7f00000001c0), 0x1}, 0x800, 0xd4, 0x0, 0x0, 0x224, 0x1, 0x4}, r0, 0x5, 0xffffffffffffff9c, 0x2) perf_event_open$cgroup(&(0x7f0000000100)={0x7, 0x70, 0xfff, 0xff, 0x1, 0xac47, 0x0, 0x20, 0x10000, 0xa, 0xffffffffe9ae50db, 0x8e6, 0x22, 0x1fe00, 0x5, 0x7, 0x0, 0x100000001, 0x8, 0x301, 0x1f, 0x6, 0x1, 0x4, 0x0, 0x7, 0xff, 0x1, 0x100000001, 0xf2, 0x134, 0x3427, 0xe102, 0x5, 0x7f, 0xfffffffffffffffb, 0x5, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x90, 0x45, 0x9, 0x3, 0x6, 0x7, 0x2}, r0, 0x0, r2, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r1, &(0x7f0000000380)="ba53036dfb73d136d6f5e6a300c7308b5e932091ac9bc3b41613a7f4580971be300ca747e8b836019af1288678217bb23321c50220eec4094c852d088d9121a756bb93faf9edfb3cc34eff306254b05af7bc0a442c4a07352a422323f5926293125de4693a047068729f7fa540a77735c736dfc40588b3231e8e9c2a961c37be46a0a7a0faf4813d9363cd63e97cd92dde55b83a3fe0f470cc85b04c48f80f393feef123a95c70e3414e067241955befdb6d1c9a36cb23482f5bc8c4ae34d9c8de17955585eb", &(0x7f0000000480)=""/185}, 0x18) 12:06:55 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:55 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000009000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:55 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'bcsf0\x00', @remote}) 12:06:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000040000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:56 executing program 1: r0 = socket$kcm(0x10, 0x1, 0x0) recvmsg(r0, &(0x7f0000000380)={&(0x7f0000000140)=@ax25, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/136, 0x88}, {&(0x7f0000000280)=""/110, 0x6e}, {&(0x7f0000000300)=""/84, 0x54}], 0x3, &(0x7f00000000c0)=""/22, 0x16, 0x80000001}, 0x2000) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e000000100081aee4050cecdb4cb9040a485e510b0000007f9cf072000000002b51da1940d819aa000000000000", 0x2e}], 0x1, &(0x7f00000013c0)}, 0x0) 12:06:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffff9c, 0x0, 0x17, &(0x7f0000000040)='cgroup.subtree_control\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r2, r1, 0x0, 0x17, &(0x7f0000000000)='cgroup.subtree_control\x00', r3}, 0x30) 12:06:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000900000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:56 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000480)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x1800000000000005, 0xe, 0x29, &(0x7f0000000000)="b90703e69ebf08bb64879e1086dd", &(0x7f0000000140)=""/41, 0x69}, 0x28) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) socketpair$inet(0x2, 0x5, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000002c0)='md5sum-\x00') socketpair(0x11, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_pid(r5, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xffffffffffffffff, 0x88d, 0x3ff, 0x175, 0x80000000, 0x0, 0x4, 0x0, 0x5, 0x8001, 0x8, 0x0, 0x2, 0x0, 0x7, 0x894b, 0x6, 0x0, 0x1, 0x0, 0x7c89, 0x3a7, 0x5, 0x10001, 0x68b, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000400), 0x2}, 0x808, 0xac, 0x1, 0x0, 0x7fffffff, 0x100000000, 0x9}, 0x0, 0x7, r4, 0x1) mkdir(&(0x7f0000000300)='./file0/file1\x00', 0x101) socket$kcm(0xa, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8936, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r5, 0x0, 0xfd, 0xeb, &(0x7f0000000540)="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", &(0x7f0000000640)=""/235, 0x5}, 0x28) 12:06:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000009000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x7f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x5, 0x70, 0xfffffffffffffffa, 0xfffffffffffffe00, 0x2, 0x1, 0x0, 0x3, 0x20000, 0x0, 0x8, 0x5, 0x1, 0x1ff, 0x5, 0x5, 0x100, 0x6, 0x401, 0x4, 0x3, 0x100000000, 0x9, 0x0, 0xff, 0xe58b, 0x3, 0xc4, 0x1000000, 0x3, 0x5, 0x7c3, 0x8, 0xfffffffffffff32e, 0x5, 0x1, 0x40, 0x1000000000, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x9108, 0x100000001, 0x469ca797, 0x0, 0xe3a, 0x101, 0x3}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c80)={r1}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(r3, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r4, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0200c72054b5851d000000708f31242ad4f3f3f00d0a04500cfc1f53b74e6678cf0c87dccc55d8d356610c473dc0e84c0a26a1ed40adea33b06aa688759d0282139c16eae754cecc8bcb311634d427000000000000000000000000009c2ee733a1ff482a19095180c19f4500791cff49cfdc3c71a35106f4952d8b48efa49878cd2e6b2fb884d9ca13b863daeb5df924134e290b303a1b913f2573965b3454bd1f00271a2fa9d52e853d750b33475c7be7c358b12ed37bcc03e8d73523cbc655c7d7fea42d42"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r9, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r10 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r10, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r10, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {&(0x7f0000003d40)=""/31, 0x1f}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r8, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r11, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, &(0x7f0000004280)=ANY=[], 0x0, 0x80}, 0x10) recvmsg(r10, &(0x7f0000009e80)={&(0x7f0000008980)=@ll, 0x80, &(0x7f0000009d40), 0x0, &(0x7f0000009dc0)=""/137, 0x89}, 0x2) sendmsg(r10, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r13, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000cc0), 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r14, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r14, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 12:06:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x1ff) 12:06:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b003e0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000700000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000e0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)=0x1) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:56 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000006000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:56 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000900ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 3: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x12, 0x200000000000029d, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x177, 0x0, 0xf, 0xb, 0xffffffffffffffe0, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, @alu={0x7, 0x8, 0x7, 0x9, 0xb, 0xfffffffffffffffe, 0x10}, @alu={0x7, 0x6, 0x7, 0xb, 0x7, 0x8, 0xfffffffffffffffc}, @ldst={0x0, 0x3, 0x3, 0x5, 0x3, 0x30, 0x8}, @exit, @ldst={0x1, 0x1, 0x0, 0x3, 0xf, 0xffffffffffffffc0, 0xffffffffffffffff}, @generic={0x7, 0x100000001, 0x8, 0x7ff, 0x1}], &(0x7f0000000180)='GPL\x00', 0x1, 0x1, &(0x7f00000001c0)=""/1, 0x41000, 0xfffffffffffffffe, [], 0x0, 0x5}, 0x48) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r0, r1, 0xf, 0x1}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f3ec56a6f7570006e496dff3c3bebf0b88dc09fbb7a095791c18d6e50eabf8419", 0x200002, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x9) 12:06:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000a0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:57 executing program 5: socketpair(0x0, 0x80000, 0x7, &(0x7f0000000300)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f00000000c0)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000880)={&(0x7f0000000680)=@can, 0x80, &(0x7f0000000740)=[{&(0x7f0000000700)=""/32, 0x20}], 0x1, &(0x7f0000000780)=""/201, 0xc9, 0x2}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="188000f3ce0e95f5d7df65acc3d5cde97a5503f7287b000018100000", @ANYRES32, @ANYBLOB="00000000000000000000000000000000950000000000000085000000360000009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0x3}, 0x48) perf_event_open(&(0x7f0000001380)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0x1) 12:06:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000a00ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b07000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x7f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x5, 0x70, 0xfffffffffffffffa, 0xfffffffffffffe00, 0x2, 0x1, 0x0, 0x3, 0x20000, 0x0, 0x8, 0x5, 0x1, 0x1ff, 0x5, 0x5, 0x100, 0x6, 0x401, 0x4, 0x3, 0x100000000, 0x9, 0x0, 0xff, 0xe58b, 0x3, 0xc4, 0x1000000, 0x3, 0x5, 0x7c3, 0x8, 0xfffffffffffff32e, 0x5, 0x1, 0x40, 0x1000000000, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x9108, 0x100000001, 0x469ca797, 0x0, 0xe3a, 0x101, 0x3}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c80)={r1}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(r3, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r4, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0200c72054b5851d000000708f31242ad4f3f3f00d0a04500cfc1f53b74e6678cf0c87dccc55d8d356610c473dc0e84c0a26a1ed40adea33b06aa688759d0282139c16eae754cecc8bcb311634d427000000000000000000000000009c2ee733a1ff482a19095180c19f4500791cff49cfdc3c71a35106f4952d8b48efa49878cd2e6b2fb884d9ca13b863daeb5df924134e290b303a1b913f2573965b3454bd1f00271a2fa9d52e853d750b33475c7be7c358b12ed37bcc03e8d73523cbc655c7d7fea42d42"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r9, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r10 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r10, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r10, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {&(0x7f0000003d40)=""/31, 0x1f}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r8, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r11, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, &(0x7f0000004280)=ANY=[], 0x0, 0x80}, 0x10) recvmsg(r10, &(0x7f0000009e80)={&(0x7f0000008980)=@ll, 0x80, &(0x7f0000009d40), 0x0, &(0x7f0000009dc0)=""/137, 0x89}, 0x2) sendmsg(r10, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r13, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000cc0), 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r14, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r14, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 12:06:57 executing program 3: socketpair(0x0, 0x80000, 0x8000, &(0x7f0000000280)={0xffffffffffffffff}) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='pids.current\x00', 0x0, 0x0) socketpair(0x11, 0x7, 0x8, &(0x7f0000000180)={0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='pids.current\x00', r1}, 0x10) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='cpuacct.usage_percpu\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r3, 0x7, 0xe3177e6ac70128da, 0x400, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000000)=0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) socketpair(0xf, 0x4, 0x400, &(0x7f0000000300)) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r3, r1, 0x6, 0x3}, 0x10) 12:06:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b30000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000080)={[{0x2d, 'cpu'}, {0x2d, 'cpu'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'cpu'}]}, 0x1b) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000a001800000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000030000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b008001a0000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:57 executing program 3: socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x15, 0x6, 0x10001, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'ipddp0\x00', 0x810}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair(0xf, 0x4, 0x0, &(0x7f0000000100)) 12:06:57 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xf, 0x7, 0xb8, 0x2, 0x24, 0xffffffffffffff9c, 0x20}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000018c0)={0xffffffffffffffff, 0x28, &(0x7f0000001880)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002900)={r1, 0x28, &(0x7f00000028c0)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002880)={r2, 0x400000000000004, 0x11}, 0xa9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0xfffffffffffffe17, &(0x7f0000000240)}, 0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001440)=ANY=[@ANYBLOB="9feb010018000000000000004000010400000000000000003a74984f9dcba8ead4994ae71a9693fee4c2fc5f941a777cbc3e5117971fbbed2aca291a450259ce42c66f5d2f4310e90c2e4936344d03a083fac0167636000000aac5f307c96854c04be4b22cc5c982190cd6422e3fb96016fb7a6e72b8eb4b02ef3fa4beea2b6f53a5065c6e5455b6a2819cd9f57ee5b473c00a52c9a858baf2dd225f27a3769621c21e3cd72aabdf5c122e1d99971730b77a22edd10471ac8265314fc142bdd9812bd906003d8da8f5f3ae6ad3a01a2b4b8b89043a60519fb34d8d55155b96cc408bd74c973c62b16795fdd6dd3afe8177c92c54449d3825ebde8116c69e1f7a5a15d051beb4e45613a3482d32dde62b5288d5da43769c6acd5f04eae10b6a0bc15a1a09a0fd8a6d09f8"], &(0x7f0000000280)=""/90, 0x12a, 0x5a, 0x1}, 0x20) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x2, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000001580)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)=""/23, 0xfc, 0x17}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000019c0)={r4, 0x28, &(0x7f0000001980)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000004280)={&(0x7f0000001780)=@sco={0x1f, {0x1, 0x9, 0x8000, 0x9, 0x1000}}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002c40)}], 0x1, &(0x7f0000002d00), 0x0, 0x80}, 0x48001) write$cgroup_int(r4, &(0x7f0000000000), 0x17b) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) close(0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000001840)={r6}) close(r4) 12:06:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b02000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x8, 0x10003, 0xffff, &(0x7f0000000040)) 12:06:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x7f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x5, 0x70, 0xfffffffffffffffa, 0xfffffffffffffe00, 0x2, 0x1, 0x0, 0x3, 0x20000, 0x0, 0x8, 0x5, 0x1, 0x1ff, 0x5, 0x5, 0x100, 0x6, 0x401, 0x4, 0x3, 0x100000000, 0x9, 0x0, 0xff, 0xe58b, 0x3, 0xc4, 0x1000000, 0x3, 0x5, 0x7c3, 0x8, 0xfffffffffffff32e, 0x5, 0x1, 0x40, 0x1000000000, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x9108, 0x100000001, 0x469ca797, 0x0, 0xe3a, 0x101, 0x3}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c80)={r1}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(r3, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r4, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0200c72054b5851d000000708f31242ad4f3f3f00d0a04500cfc1f53b74e6678cf0c87dccc55d8d356610c473dc0e84c0a26a1ed40adea33b06aa688759d0282139c16eae754cecc8bcb311634d427000000000000000000000000009c2ee733a1ff482a19095180c19f4500791cff49cfdc3c71a35106f4952d8b48efa49878cd2e6b2fb884d9ca13b863daeb5df924134e290b303a1b913f2573965b3454bd1f00271a2fa9d52e853d750b33475c7be7c358b12ed37bcc03e8d73523cbc655c7d7fea42d42"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r9, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r10 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r10, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r10, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {&(0x7f0000003d40)=""/31, 0x1f}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r8, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r11, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, &(0x7f0000004280)=ANY=[], 0x0, 0x80}, 0x10) recvmsg(r10, &(0x7f0000009e80)={&(0x7f0000008980)=@ll, 0x80, &(0x7f0000009d40), 0x0, &(0x7f0000009dc0)=""/137, 0x89}, 0x2) sendmsg(r10, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r13, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000cc0), 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r14, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r14, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 12:06:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000e000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:58 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:58 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000005000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:58 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)="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") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xf, 0x7, 0xb8, 0x2, 0x24, 0xffffffffffffff9c, 0x20}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000018c0)={0xffffffffffffffff, 0x28, &(0x7f0000001880)}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002900)={r1, 0x28, &(0x7f00000028c0)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002880)={r2, 0x400000000000004, 0x11}, 0xa9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0xfffffffffffffe17, &(0x7f0000000240)}, 0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) socket$kcm(0x29, 0x7, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000001440)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/90, 0x12a, 0x5a, 0x1}, 0x20) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x11, 0x2, 0x300) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000001580)=ANY=[@ANYBLOB="9feb0100180000000000000088000000a00000007a9cd51d5d73d542082dc8fe859cc47fe2f1612c7f30179e88dade0300b764b9ba38d757ca1277f0c9e316f3fee0ad21a28663a4769a3361faed4c3b2bf53d4f0ec7805b93b1cfac382f040018766d275c56b5b6cc1c452d2f5cc2ccf5ea24fcbe7c16ca6084e6d35517603f831c11c111058a95103c000004d8b0416cfc99012c573fcb571b6bb30959c59958f52f782048b97a5ab83c8062e19a826364bac9abc2051c678ad00f2edc3e4c6fcb4f1b521f84b43c421395b25a8e90e467dd26635ac465f3fbab00000000000000ecc051001b1c630b013774c08c4005db294b1b52ef4735fa7649"], &(0x7f0000000040)=""/23, 0xfc, 0x17}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000019c0)={r4, 0x28, &(0x7f0000001980)}, 0x10) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000100)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000004280)={&(0x7f0000001780)=@sco={0x1f, {0x1, 0x9, 0x8000, 0x9, 0x1000}}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002c40)}], 0x1, &(0x7f0000002d00), 0x0, 0x80}, 0x48001) write$cgroup_int(r4, &(0x7f0000000000), 0x17b) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000440)=""/4096}, 0x18) close(0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000001840)={r6}) close(r4) 12:06:58 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x5e303289b8d2a05a, 0x1}, 0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000f00)}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) socketpair(0x9, 0xf, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r2, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=""/77, 0x4d, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r1, 0x10, &(0x7f00000002c0)={&(0x7f00000000c0)=""/98, 0x62, r3}}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r4, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000001000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:58 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000e00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:58 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000300)='./cgroup\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380)=r1, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0xd, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, [@ldst={0x1, 0x0, 0x0, 0xb, 0x0, 0x16d}, @call={0x85, 0x0, 0x0, 0x57}, @call={0x85, 0x0, 0x0, 0x30}, @map={0x18, 0x6, 0x1, 0x0, 0x1}, @alu={0x7, 0x7fffffff, 0xf, 0xf, 0x1, 0x8c, 0xfffffffffffffff0}, @alu={0x7, 0x80, 0x6, 0x7, 0xf, 0xffffffffffffffff, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x12}, @map={0x18, 0x7, 0x1, 0x0, 0xffffffffffffff9c}]}, &(0x7f00000000c0)='GPL\x00', 0x5, 0x88, &(0x7f0000000100)=""/136, 0x41100, 0x1, [], 0x0, 0xc0635370e9a463e1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) 12:06:58 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) socketpair$inet(0x2, 0x1, 0x2, &(0x7f0000000000)) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 420.585881] net_ratelimit: 1322 callbacks suppressed [ 420.585890] protocol 0004 is buggy, dev gre0 [ 420.586164] protocol 0004 is buggy, dev gre0 [ 420.598753] protocol 0004 is buggy, dev gre0 [ 420.603392] protocol 0004 is buggy, dev gre0 [ 420.608117] protocol 0004 is buggy, dev gre0 [ 420.609307] protocol 0004 is buggy, dev gre0 [ 420.616406] protocol 0004 is buggy, dev gre0 [ 420.618313] protocol 0004 is buggy, dev gre0 [ 420.627063] protocol 0004 is buggy, dev gre0 [ 420.629644] protocol 0004 is buggy, dev gre0 12:06:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681bfffffffe000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x0, 0x8c9, 0x0, 0x0, 0x344, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x7f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x19c}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x5, 0x70, 0xfffffffffffffffa, 0xfffffffffffffe00, 0x2, 0x1, 0x0, 0x3, 0x20000, 0x0, 0x8, 0x5, 0x1, 0x1ff, 0x5, 0x5, 0x100, 0x6, 0x401, 0x4, 0x3, 0x100000000, 0x9, 0x0, 0xff, 0xe58b, 0x3, 0xc4, 0x1000000, 0x3, 0x5, 0x7c3, 0x8, 0xfffffffffffff32e, 0x5, 0x1, 0x40, 0x1000000000, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000100), 0xe}, 0x9108, 0x100000001, 0x469ca797, 0x0, 0xe3a, 0x101, 0x3}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000c80)={r1}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000f80)={&(0x7f0000000dc0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000e40)=""/209, 0xd1}], 0x1, 0x0, 0x0, 0x3ff}, 0x2020) sendmsg$kcm(r3, &(0x7f00000011c0)={&(0x7f0000000fc0)=@hci={0x1f, r4, 0x2}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001100)="0465b3c19e63ad6eba7f8f7a34e01751e39f299535bb229b1e0c439be4b4038d0f3ad6a80cda6f471a33b796e6c9058071752833f58a145397e188a03a22aeea10cc4ad6da8d673aab1817b21702283e48bee188dc4cbf72740964c4f6d106eeef058c6fc768ed2e1c40bedea4b7bf79021a25678bb4284949351ae3d40d92", 0x7f}], 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000cc0)=ANY=[@ANYBLOB="0200c72054b5851d000000708f31242ad4f3f3f00d0a04500cfc1f53b74e6678cf0c87dccc55d8d356610c473dc0e84c0a26a1ed40adea33b06aa688759d0282139c16eae754cecc8bcb311634d427000000000000000000000000009c2ee733a1ff482a19095180c19f4500791cff49cfdc3c71a35106f4952d8b48efa49878cd2e6b2fb884d9ca13b863daeb5df924134e290b303a1b913f2573965b3454bd1f00271a2fa9d52e853d750b33475c7be7c358b12ed37bcc03e8d73523cbc655c7d7fea42d42"]) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000b00)={&(0x7f00000005c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/146, 0x92}, {&(0x7f0000000540)=""/53, 0x35}, {&(0x7f0000000780)=""/121, 0x79}, {&(0x7f0000000800)=""/72, 0x48}, {&(0x7f0000000700)=""/29, 0x1d}, {&(0x7f0000000880)=""/16, 0x10}, {&(0x7f00000008c0)=""/140, 0x8c}, {&(0x7f0000000980)=""/116, 0x74}], 0x8, &(0x7f0000000a80)=""/82, 0x52, 0xffff}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000b80)={r6}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r8, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r9, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') r10 = socket$kcm(0xa, 0x1, 0x0) sendmsg(r10, &(0x7f0000001540)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x80, &(0x7f00000013c0), 0x0, &(0x7f0000001400)}, 0x2000c4ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) recvmsg(r10, &(0x7f0000003f00)={&(0x7f0000003940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003e80)=[{&(0x7f00000039c0)=""/134, 0x86}, {&(0x7f0000003a80)=""/128, 0x80}, {&(0x7f0000003b00)=""/114, 0x72}, {&(0x7f0000003b80)=""/203, 0xcb}, {&(0x7f0000003c80)=""/134, 0x86}, {&(0x7f0000003d40)=""/31, 0x1f}, {&(0x7f0000003d80)=""/244, 0xf4}], 0x7, 0x0, 0x0, 0x2}, 0x100) sendmsg$kcm(r8, &(0x7f00000046c0)={&(0x7f0000003f40)=@ll={0x11, 0xff, r11, 0x1, 0x7, 0x6, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f0000004100)="49c6c5f4afa6c86ef1c5989d19f68ba462164ecc55f6057816dae92293273612ca3693bf8029cf8db6542a20f149d47f6ee98e5c237ee3aab9ae1325f1b962e5f09c530d30e2db994250d7da60b5c83e5ee27e13e607f0802172e05ecb357ea0d6b0d9673b87509d229b0618cc3852dc145af37c9bc055288d640f24145b44affdd8e62a9d3fce3f5abad77beb45ac0eb102dc782d23aeb66cb1f5cf7aeea7a0e9ebf37c218e38d9976606368e78eae6f21637718261de465cf407dbcb47a6de6ed1e70f98dc065d3a3e8a5044e5a5d942e6573ab1452c5c7f2741e1b025166715f40f2efb7a9cc0b110a0", 0xeb}], 0x1, &(0x7f0000004280)=ANY=[], 0x0, 0x80}, 0x10) recvmsg(r10, &(0x7f0000009e80)={&(0x7f0000008980)=@ll, 0x80, &(0x7f0000009d40), 0x0, &(0x7f0000009dc0)=""/137, 0x89}, 0x2) sendmsg(r10, &(0x7f000000a180)={&(0x7f0000009ec0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f000000a140)}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r13, &(0x7f0000000500)={&(0x7f0000000440)=@ipx={0x4, 0x5, 0x5, "3e5b2a0820b2", 0x6}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000cc0), 0x0, 0x20048040}, 0x20000010) sendmsg$kcm(r14, &(0x7f0000000240)={&(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="1656610de99efc3b62ab0bb70a1c008128", 0x11}], 0x1}, 0x8000) sendmsg(r14, &(0x7f0000000340)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f0000001740), 0x0, &(0x7f0000000380)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f0000000280)='&selinux#-\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 12:06:59 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000004000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x2, 0x2, 0x831, &(0x7f0000000000)) 12:06:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00180000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:59 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x0, 0x29, &(0x7f0000000140), &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:59 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000003f00ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="2e2f383fc5c17230a365694a6367726f7570003425e490f0fba1fe672a6098b6842d10e2a6754d98c1ff91e26fc1bf80fad9", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:06:59 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x7, 0x29, &(0x7f0000000140)="b90703e69ebf08", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:06:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b05000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:06:59 executing program 3: r0 = openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'rdma'}, {0x0, 'cpu'}, {0x2d, 'io'}, {0x2d, 'io'}, {0x2d, 'io'}]}, 0x17) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f00000000c0)={r3}) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xb, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:00 executing program 1: socketpair(0x28, 0x0, 0x28, &(0x7f0000000000)) r0 = gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x7fff, 0x0, 0x100000001, 0x9, 0x0, 0xe4, 0x0, 0x6, 0x2, 0x7, 0x5, 0x400, 0x1, 0x5, 0x100, 0x3bf, 0x4, 0x101, 0xfffffffffffffffb, 0x46d, 0x1, 0x7, 0x5, 0x2, 0x0, 0xfffffffffffffffa, 0x0, 0x3, 0x8, 0x3, 0x1, 0x3, 0x7, 0x1f, 0x5, 0x100, 0x0, 0x80000001, 0x0, @perf_config_ext={0x37, 0x6}, 0x600, 0xc9, 0x81, 0x3, 0x2, 0x85, 0xffffffffffffffef}, r0, 0x4, 0xffffffffffffff9c, 0x1) 12:07:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000f000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)="010800000500000000", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681ba0008000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)="2f66726f66702e7374993c9a", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x401c5820, 0x7fffff) 12:07:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e1008", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xddb2, 0x4, 0x100000000, 0x81, 0x0, 0x6, 0x200, 0x1, 0x6, 0x3b, 0x9, 0x6, 0xffffffffffffffff, 0x7fffffff, 0x100000001, 0x6, 0x8, 0xdc3e, 0x5, 0x7ff, 0x3, 0x1, 0x3, 0xfffffffffffffb87, 0x7d, 0x1, 0xd0, 0x3e7, 0x8, 0x1, 0x80000000, 0x4, 0x0, 0x9, 0x0, 0xffff, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x880, 0xfffffffffffffffc, 0x3cb5, 0x1, 0x401, 0xfffffffffffff719, 0x10001}, 0x0, 0xb, r1, 0xa) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xfffffffffffffffa) 12:07:00 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0xffffffffffffffff, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) 12:07:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00003e00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000003e000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 12:07:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00001800000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000002000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 12:07:00 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0xddb2, 0x4, 0x100000000, 0x81, 0x0, 0x6, 0x200, 0x1, 0x6, 0x3b, 0x9, 0x6, 0xffffffffffffffff, 0x7fffffff, 0x100000001, 0x6, 0x8, 0xdc3e, 0x5, 0x7ff, 0x3, 0x1, 0x3, 0xfffffffffffffb87, 0x7d, 0x1, 0xd0, 0x3e7, 0x8, 0x1, 0x80000000, 0x4, 0x0, 0x9, 0x0, 0xffff, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x880, 0xfffffffffffffffc, 0x3cb5, 0x1, 0x401, 0xfffffffffffff719, 0x10001}, 0x0, 0xb, r1, 0xa) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0xfffffffffffffffa) 12:07:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 12:07:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00070000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000400000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x60ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x70, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe3, 0x5a1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x31a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x5, @perf_bp={&(0x7f0000000280)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000680)='memory.events\x00', 0x0, 0x0) write$cgroup_int(r0, &(0x7f00000000c0)=0x6, 0x12) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000a40)={0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000800)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 12:07:00 executing program 3: socketpair(0x2, 0x80001, 0x8, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x1, 0x8933, 0xfffffffffffffff9, 0x7fff, 0x0, 0x1ff, 0x200, 0xd, 0x10001, 0x8, 0x4, 0x8, 0x8000, 0x595, 0x8, 0x643, 0x1, 0x8001, 0x1, 0x9, 0x3, 0x9, 0x8, 0x8, 0x2, 0x76df3b22, 0x0, 0x3, 0x81, 0x0, 0x2, 0x0, 0x9, 0x6, 0x6, 0x1, 0x0, 0x1ff, 0x3, @perf_config_ext={0x3c, 0xa9b6}, 0x40, 0x3, 0xfffffffffffffff9, 0x2, 0x183d, 0x7, 0x80000001}, r0, 0xb, 0xffffffffffffffff, 0xe) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) openat$cgroup_subtree(r2, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 12:07:00 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41}, 0x28) 12:07:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b008000a0000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000008001a0ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x0, 0x2}, 0x14) socketpair(0x0, 0x8080e, 0x100, &(0x7f0000000100)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r2, &(0x7f0000000180)="c3ceb94642586fdb133d1c6ae06f51dc49e69cc93b34b341a3192243", &(0x7f00000001c0)=""/112}, 0x18) 12:07:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 12:07:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f16d0d35175702e6370752f73597a3100d53bdd516a4a8f392d8f76eb9ce26222906b3c9f83fa61f32ee8cf4148c00b3adb7d520982c0ceef819b69e4d753f1709d691e2364f894c4f8921e60774824fb32e253acf099e529491c5e595d42940061dd5470cfdcd9e772e2dbf1e87e1299c0d1c285665f6ba2200ee311f7a439e23ef32a466ed4f7f2376eebdb2ed09a99291c1983b0728c7b3ddefb93ebc97a276a1d9be71a88592fbc3add2ceefdeda68784408c6838cf9e16e6b8139bf0b59c1958a0249ac4e3", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x5, 0x2, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r2, 0x80002, 0x9, 0x1, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) openat$cgroup_int(r1, &(0x7f00000001c0)='cpuset.mem_exclusive\x00', 0x2, 0x0) 12:07:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000340)={0x0, 0x0}}, 0x2e0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x7116c61479153d0d, 0x0, 0x1f, 0x9, 0x2, 0x6, 0x8, 0x4, 0x73, 0x0, 0xba7c, 0x0, 0x0, 0x600000, 0x0, 0x6e, 0x0, 0x7, 0x0, 0x0, 0x9, 0x8, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0xa, 0x5, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000200)="6370777365742e656666656389b844a45f6d657d7300b454700c04e1b4677a8497f353ec94350363", 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0xfffffffffffffffe) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0494e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000002340), 0x4) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) socket$kcm(0x29, 0x80000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000780)=ANY=[], 0x0, 0xfffffffffffffffe}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000480)={'team0\x00', 0x1000}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000000800)}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r1, 0x7, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') socketpair(0x5, 0xfffffffffffffffe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(r4, &(0x7f0000000100)=0x4, 0x4) close(r7) ioctl$TUNSETOFFLOAD(r10, 0x400454d0, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r4}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000002c0)) write$cgroup_pid(r9, &(0x7f0000000080), 0x12) ioctl$TUNSETPERSIST(r8, 0x400454cb, 0x1) 12:07:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000005000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000018000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) 12:07:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) 12:07:01 executing program 1 (fault-call:5 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x1, 0x4) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x9, 0x18}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000080)="3f83de9cb5c37540d723c7779606a41dbb0e6ed54305fad14e2bc1e01dbe708a59bcb0aa5690555047b8b2769fe80a1f37f55fabdfedb4e4b214937f90af8fcd37b6518fd747cceb732e2aa78cb111077413e8aff2fddd2de565f929f79a81c2b6cb81de4f71960ab77c67affa0cae61027ac711a6f1da17bb9520c026942d92", &(0x7f0000000100)=""/28}, 0x18) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 423.412828] FAULT_INJECTION: forcing a failure. [ 423.412828] name failslab, interval 1, probability 0, space 0, times 0 12:07:01 executing program 4: r0 = socket$kcm(0x10, 0x800000000002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000000)={r0}) 12:07:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 12:07:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000feffffffead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 423.514535] CPU: 1 PID: 25119 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #81 [ 423.521903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.531283] Call Trace: [ 423.531318] dump_stack+0x244/0x39d [ 423.531346] ? dump_stack_print_info.cold.1+0x20/0x20 [ 423.531377] ? __lock_acquire+0x62f/0x4c20 [ 423.531406] should_fail.cold.4+0xa/0x17 [ 423.537620] ? find_held_lock+0x36/0x1c0 [ 423.555167] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.560299] ? lock_downgrade+0x900/0x900 [ 423.560318] ? check_preemption_disabled+0x48/0x280 [ 423.560340] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 423.574434] ? kasan_check_read+0x11/0x20 [ 423.578596] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 423.584127] ? rcu_softirq_qs+0x20/0x20 [ 423.588140] ? find_held_lock+0x36/0x1c0 [ 423.592256] ? perf_trace_sched_process_exec+0x860/0x860 [ 423.597742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.603310] __should_failslab+0x124/0x180 [ 423.607688] should_failslab+0x9/0x14 [ 423.611506] __kmalloc+0x2e0/0x760 [ 423.615069] ? bpf_test_init.isra.10+0x98/0x100 [ 423.619754] bpf_test_init.isra.10+0x98/0x100 [ 423.624267] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 423.629118] bpf_prog_test_run_skb+0x109/0xcb0 [ 423.633710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.639264] ? cap_capable+0x1f9/0x260 [ 423.643169] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 423.648032] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 423.653614] ? fput+0x130/0x1a0 [ 423.656902] ? __bpf_prog_get+0x9b/0x290 [ 423.660984] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 423.665842] bpf_prog_test_run+0x130/0x1a0 [ 423.670095] __x64_sys_bpf+0x3d8/0x520 [ 423.673988] ? bpf_prog_get+0x20/0x20 [ 423.677824] do_syscall_64+0x1b9/0x820 [ 423.681724] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 423.687124] ? syscall_return_slowpath+0x5e0/0x5e0 [ 423.692089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 423.696965] ? trace_hardirqs_on_caller+0x310/0x310 [ 423.702022] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 423.707086] ? prepare_exit_to_usermode+0x291/0x3b0 [ 423.712141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 423.717008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.722214] RIP: 0033:0x457569 [ 423.725424] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 423.744349] RSP: 002b:00007f7d8614ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 423.752088] RAX: ffffffffffffffda RBX: 00007f7d8614ac90 RCX: 0000000000457569 12:07:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000030000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 423.759364] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 423.766638] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 423.773997] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d8614b6d4 [ 423.781271] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000005 12:07:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000000c0)=0x1f) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x2, 0x1, 0x8, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x9, 0x3, 0x9, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x4) 12:07:02 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f00000014c0)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/206, 0xce}, {&(0x7f00000001c0)=""/231, 0xe7}, {&(0x7f00000002c0)=""/204, 0xcc}, {&(0x7f00000003c0)=""/144, 0x90}], 0x4, &(0x7f00000004c0)=""/4096, 0x1000, 0x9}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x29, 0x12, &(0x7f0000000000)=0xffffffffffffff9c, 0x20c) 12:07:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0x8}, 0xfffffffffffffecd) r1 = getpid() r2 = perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x80000000, 0x3, 0x100, 0xfffffffffffffffd, 0x0, 0x3, 0x41010, 0xb, 0x5, 0x3, 0x100, 0x5, 0x1, 0x3, 0x3, 0x467, 0x0, 0x1c00000000000, 0xdfe, 0x205a, 0x1, 0x8000, 0x10001, 0x40, 0x62, 0x1, 0x3, 0x1, 0x1, 0x2, 0x8, 0xffffffff, 0x2, 0x1, 0x1ff, 0x598, 0x0, 0xf2bd, 0x4, @perf_bp={&(0x7f00000000c0), 0x6}, 0x80c, 0x7, 0x3, 0xe, 0x20004000, 0x0, 0x1}, 0x0, 0x0, r0, 0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x100000001, 0x0, 0x9, 0x800, 0x0, 0x3ff, 0x8000, 0x1, 0xea4, 0x2, 0x13c23b05, 0x1, 0x9, 0x1697, 0xff, 0xfffffffffffff746, 0x0, 0xc9, 0x0, 0x2, 0x8, 0x2, 0x4, 0xc60f, 0x5, 0x0, 0x5, 0x6, 0x9bf, 0x1, 0x7fe, 0x9, 0x2, 0x3, 0x4, 0x100000001, 0x0, 0xffffffff, 0x6, @perf_bp={&(0x7f0000000000), 0x4}, 0x4200, 0x2, 0x6, 0x6, 0x6, 0x0, 0x1}, r1, 0x7, r2, 0x8) 12:07:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000e000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:02 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000060ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:02 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:02 executing program 1 (fault-call:5 fault-nth:1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:02 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) [ 424.249280] FAULT_INJECTION: forcing a failure. [ 424.249280] name failslab, interval 1, probability 0, space 0, times 0 [ 424.289957] CPU: 0 PID: 25169 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #81 [ 424.297308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.297323] Call Trace: [ 424.297356] dump_stack+0x244/0x39d [ 424.297384] ? dump_stack_print_info.cold.1+0x20/0x20 [ 424.297420] should_fail.cold.4+0xa/0x17 [ 424.297446] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.297464] ? save_stack+0x43/0xd0 [ 424.297482] ? kasan_kmalloc+0xc7/0xe0 [ 424.297495] ? __kmalloc+0x15b/0x760 [ 424.297510] ? bpf_test_init.isra.10+0x98/0x100 [ 424.297536] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 424.297554] ? rcu_softirq_qs+0x20/0x20 [ 424.297579] ? find_held_lock+0x36/0x1c0 [ 424.297603] ? find_held_lock+0x36/0x1c0 [ 424.297654] ? perf_trace_sched_process_exec+0x860/0x860 [ 424.297689] __should_failslab+0x124/0x180 [ 424.297715] should_failslab+0x9/0x14 [ 424.297733] kmem_cache_alloc_trace+0x2d7/0x750 [ 424.297756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.297774] ? bpf_test_init.isra.10+0x70/0x100 [ 424.297801] bpf_prog_test_run_skb+0x1da/0xcb0 [ 424.297819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.297843] ? cap_capable+0x1f9/0x260 [ 424.297874] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 424.407970] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 424.413521] ? fput+0x130/0x1a0 [ 424.416808] ? __bpf_prog_get+0x9b/0x290 [ 424.420878] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 424.425723] bpf_prog_test_run+0x130/0x1a0 [ 424.429967] __x64_sys_bpf+0x3d8/0x520 [ 424.433859] ? bpf_prog_get+0x20/0x20 [ 424.437687] do_syscall_64+0x1b9/0x820 [ 424.441578] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 424.446946] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.451880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.456729] ? trace_hardirqs_on_caller+0x310/0x310 [ 424.461752] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 424.466774] ? prepare_exit_to_usermode+0x291/0x3b0 [ 424.471801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.476658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.481854] RIP: 0033:0x457569 [ 424.485084] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.503999] RSP: 002b:00007f7d8614ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 424.511724] RAX: ffffffffffffffda RBX: 00007f7d8614ac90 RCX: 0000000000457569 [ 424.518992] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 424.526262] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 424.533532] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d8614b6d4 12:07:02 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000480)="c32f382ae528d743d14a0a04a06dba48d1b7640dd33b4e29cbc5130452dfd29d906d9fc9eddf273a0e0fa1dae5fb0f6897946a1e5b851e6b7964", 0x3a}, {&(0x7f00000004c0)="0678ad4fe7a42104c84113aeb439a9ed96f8b92f82add737da94a2ec25b14ab322cbb32d6bca437824d250fedd529dba82c77350679d5433ceb8b1ab5427825b52f6e8e06d49281dc5358163fe5ca05fc947be0a4b0fd3e624b79c3973f40966529505a85c3944d52dd462882872cfcb0fc640f5c5e97932d95b8c482ab0c65edaaf778fa8d719a03194afa058c973352140499517df670142d4bd5472b52fa8afa5805bf2f93bb1717f2c6f204fde9c2d0cf10c36e7139fc0a61676", 0xbc}, {&(0x7f0000000580)="30636bfa3721ee8831f6bc45fa8bd7adfc59307d9c350edc7a42259c9fe883dcbed44fe14feae57d90bfadf836fd8d7cac828329bc7d7e9ab00468aa097eddc8d659b9f4ab32c0eb0fd824f6fe1d50ddf49efae957e31cdd2351626ff4a0ad07f954a848e7c18c017a72202692febcac257400b74afaa30b03cca2c32561d17d90a548a1c9fbd300e6a608de842a433cdfc9e2d7077097362f7e8fc9dd688a0564e3e6e2848e61b5672acc0474a3dad8e19c3450bdc5088a0c44b71e381106213e8c1bfa631e705d789bbdd102f3cc094021", 0xd2}, {&(0x7f0000000680)="549e2cab7b24af0afa93adb9362ab5f4d8da2fd3a9aaec52377b79c3216a1c62c7ded5c7290997291686e5325e610e49ad2e1af54f0e419014ba663ff7b94e94d892f48d9d1beeea1552f58f8cd4a7f683daf9eba8e660d7c7d0293baf4ef833827b09978870b69f12d89a43fd6125aeec1a16bd9298c3cc0b7fe0cee69797a6", 0x80}, {&(0x7f0000000700)="40e3ce4af2e32ea8cac4d8bd18900d0105fb9434b9fea44e74b49c79ff4cce5f3cc99beceba6030e8cf7119124e9c391eb2a06b1d2c63cb678a00edf3534192e8604128142a5bdff42577732bfab919bfe70923d7d161178", 0x58}, {&(0x7f0000000780)="166432659990fcccb92925ee8dfbad5062bb880881afdf95b6fb8aaec1a405ff6c620172a32b314d69262a76275b360ab96cc97cbcf2e1fd88ae679bf37601f5340103abc1548a45e45f4641e1cc582613799c0bb3029b8c92bf9be551f4f99e56d4332661f350dc576b40db1840ee6e48f76cf13326214dbb46b4888716cfd569bed6eadb3bc0663bd38cf679d8e02faaea2dbe2c7a16b5e0d6eef0", 0x9c}, {&(0x7f0000000840)="ee6e5c96ffbad763a90eeb08deaf4339e0cfb89541514ffd29c8d6c9902a02fb4175f3266c88442b97341c3ddb6323c496ec64e4ca5f1feac1d2e97822af900f20cd0ea284749554d5102faf8f121031", 0x50}, {&(0x7f00000008c0)="f5202906abfa119f9283b19d3d41ce16db88", 0x12}, {&(0x7f0000000900)="e086dd2b1e0bcc44a484d7f133e00bb1225fb8e5d21301fc659a5c5f940b4d51a3ba18cd083f67eca6c9673501594a330fd193696655f13e0d122a0400ac3b81aadaf0386c00d65de379c362b913eb218fba87391f237e00a8e4d8812618f8baba", 0x61}, {&(0x7f0000000980)="bd24de10f3017444909ffdb122df4a37491b3a19eeef9c95989dae4ad158b6da6142be4085ca419905be85e5acb8734f06b99b43fd9271c802865684addef65dd423d2295e371b8ab0f50ae5a53923a56e1da7fc8875a74b89ceef6beb14dd28be1fb7d6a237f8cd1f57312b8b6ffbed66171272bcc96fdfee61e890a061e4c21266acf234cfba29b941062e17a11bae905df8a7c93b72324e610cd5f6edf4ce3b4d7576fb595f24dc8eb181959a85827a93c069bda3d1a5506fa9a69d0d06bbf45e0b138d8a", 0xc6}], 0xa, &(0x7f0000001140)=ANY=[@ANYBLOB="98000000000000001501000004000000df75ccdcfd8063885e5db552765069a9ac6870ccbebc9fff1dcdbe28f102b0085c737348ac28fb490fb8dab8e076c71bd1ce62646de002d5f88d71b64f51876129de7c5602e7e8bbd04a1a4809c05fa55245d35bb919528b7eabd37fbf52cdd843b37586cdec5a5a48cbc90bffb431d212c256762e7d7b0521e2166d7adcaec91c00000000000000f80000000000000029000000070000003c117affbeaf0c15447fe2997eb0f03d278bc966b0d4ef8c40600ee2a95a1798665ffcf2663ff7421ca6f62d0b68789d707650d536dab69a609065bae490a5af3d03aaf95ed397d97681d0b4849e5e369dccb685f93d49b7ebee7fcbad21ba48b6b2d761e59d57565521889b05705a6b788786296a856d2ce19c2d089586d30b643225106694b2752eded21ea96a34596e55e4fa0207e7ee3786a746718c60fd549c53100e7c4c01f84a39df0907fa3118939eb289c9173669bec301ec50279b4889835791ef559065c70d3aa97e341f140ffa2a8f014dd0a7e48b044033efe01caeb2701551e35f57fe5fb9c58d0c2886c3b72c52a3000090000000000000000000000008000000d88551451fd8afd2baa72ef8549673c0dca6b93437008cda1072f477fae0e95568c68748c31bf8c9fb04e1157a362dfbc195dd0c2aa96f15745781f914a02e40c451d9ae02ac0282f5d58e6ef8b362ed257c67d324f8090315d27c1b16afee764ae960a8191705d01f4f1ecd5a82730a6c4a7bf574a5b014ebeee300000000008800000000000000ff000000ff010000f80f131fc40176fced00facc5d4998901777a2fb9cc5e64a9bb4ebad80e1b56e5f3c7bb0a111217fb63f2a4663242048787ee24796aa84d5220df697da1ecea3cee509a5c9f08a4fb3ad983f1e4e921094dda4c0eddfb48022a42a11c9dd07d871641aaca564ef8c9e90a43293ff1b1ac2ba532c15baffb8c665fa3a77b2a4b4a4067d703b2cba15f10ddf748b71711c328073"], 0x2a8, 0x20000000}, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0x7}}, &(0x7f0000014ff5)="73797a6b610000000500f3", 0x2, 0xfffffec0, &(0x7f0000014000)=""/4096}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x5a, 0xfffffe73, &(0x7f00000003c0)="e46001923406080000000a9b86dd6a00000000072feb305660319056508255380081ffad000000e8d5000000010000001400001500242f89880bd320d98a51f542832f8d0021a512445db9000000002c00005ed20b54416350dd", &(0x7f0000000100)=""/157}, 0x28) [ 424.540806] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000005 12:07:02 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000009ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00f00000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:02 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)="2e2f6367726f75702e7547a08b0f8246038b63497339492d001f674187d1d632f64cd5654216091738d9d65f72e83f7024556d1ed1d31f0004000000000000aec77f8f15437a4af44f320960dae25d5f85dee6854a", 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'rdma'}, {0x2d, 'rdma'}]}, 0xc) 12:07:02 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000040)=r0, 0x52d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)="7526a354000000c30e5ac1f8fefa178d022301b0f2dad45c2b8c19e0af68a488d4e480b00ff3aab96aecca40", 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000080)={r0, r2}) 12:07:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681bf0000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:03 executing program 5: r0 = socket$kcm(0x10, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000180)={'bond0\x00', 0x400}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'veth1_to_team\x00', 0xce11}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x17b, &(0x7f00000000c0)=[{&(0x7f0000000040)="1e0000004f0081747801000000f869d9ef5b0cd90c000100f0ffffffffff", 0x1e}], 0x1, &(0x7f0000000a00)}, 0x0) socket$kcm(0x29, 0x5, 0x0) 12:07:03 executing program 1 (fault-call:5 fault-nth:2): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000000000aead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000003980)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x10000000005, 0x0, &(0x7f00000004c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000500)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000005c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0x0, 0x4, 0x0, 0x7}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x200002, 0x0) 12:07:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000090000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:03 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair(0x13, 0x80807, 0x9, &(0x7f0000000000)) 12:07:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681bfeffffff000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 425.652435] FAULT_INJECTION: forcing a failure. [ 425.652435] name failslab, interval 1, probability 0, space 0, times 0 [ 425.757289] CPU: 0 PID: 25210 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #81 [ 425.764842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.774202] Call Trace: [ 425.776807] dump_stack+0x244/0x39d [ 425.780450] ? dump_stack_print_info.cold.1+0x20/0x20 [ 425.785647] ? kasan_check_read+0x11/0x20 [ 425.789804] ? __debug_object_init+0x57d/0x1290 [ 425.794477] ? trace_hardirqs_off_caller+0x310/0x310 [ 425.799589] should_fail.cold.4+0xa/0x17 [ 425.803663] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.808772] ? __debug_object_init+0x57d/0x1290 [ 425.813448] ? rcu_softirq_qs+0x20/0x20 [ 425.817424] ? unwind_dump+0x190/0x190 [ 425.821325] ? debug_object_free+0x690/0x690 [ 425.825750] ? is_bpf_text_address+0xd3/0x170 [ 425.830254] ? kernel_text_address+0x79/0xf0 [ 425.834667] ? __kernel_text_address+0xd/0x40 [ 425.839171] ? unwind_get_return_address+0x61/0xa0 [ 425.844106] ? __save_stack_trace+0x8d/0xf0 [ 425.848449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.854003] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 425.859546] ? rcu_pm_notify+0xc0/0xc0 [ 425.863449] __should_failslab+0x124/0x180 [ 425.867697] should_failslab+0x9/0x14 [ 425.871505] kmem_cache_alloc+0x47/0x730 [ 425.875578] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.881118] ? __phys_addr+0xa6/0x120 [ 425.884921] ? kasan_unpoison_shadow+0x35/0x50 [ 425.889515] __build_skb+0xab/0x430 [ 425.893150] ? skb_try_coalesce+0x1b70/0x1b70 [ 425.897660] ? kasan_check_write+0x14/0x20 [ 425.901903] ? sock_init_data+0x9b1/0xdc0 [ 425.906064] ? rcu_pm_notify+0xc0/0xc0 [ 425.909960] ? sk_stop_timer+0x50/0x50 [ 425.913864] build_skb+0x77/0x270 [ 425.917331] ? rcu_read_lock_sched_held+0x14f/0x180 [ 425.922352] ? __build_skb+0x430/0x430 [ 425.926252] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.931795] ? bpf_test_init.isra.10+0x70/0x100 [ 425.936469] bpf_prog_test_run_skb+0x289/0xcb0 [ 425.941067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.946618] ? cap_capable+0x1f9/0x260 [ 425.950520] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 425.955364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 425.960908] ? fput+0x130/0x1a0 [ 425.964193] ? __bpf_prog_get+0x9b/0x290 [ 425.968261] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 425.973103] bpf_prog_test_run+0x130/0x1a0 [ 425.977354] __x64_sys_bpf+0x3d8/0x520 [ 425.981248] ? bpf_prog_get+0x20/0x20 [ 425.985081] do_syscall_64+0x1b9/0x820 [ 425.988971] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 425.994347] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.999280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.004128] ? trace_hardirqs_on_caller+0x310/0x310 [ 426.009150] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 426.014172] ? prepare_exit_to_usermode+0x291/0x3b0 [ 426.019201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.024065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.029260] RIP: 0033:0x457569 [ 426.032459] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.051387] RSP: 002b:00007f7d8614ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 426.059105] RAX: ffffffffffffffda RBX: 00007f7d8614ac90 RCX: 0000000000457569 [ 426.066376] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 426.073650] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 426.080920] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d8614b6d4 [ 426.088189] R13: 00000000004bd892 R14: 00000000004cc568 R15: 0000000000000005 12:07:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000a000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000540)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000003980)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x10000000005, 0x0, &(0x7f00000004c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000500)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000000c0)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000100)="6c6f00966fd651b159a9c84a2c60d29800000020") ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000005c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0x0, 0x4, 0x0, 0x7}, 0x2c) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup/syz1\x00', 0x200002, 0x0) 12:07:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000e000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="45964a5c4f0f00fe000030492a768b88b40eda954797623745e0"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000440)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0x34, 0x29, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", &(0x7f00000000c0)=""/41, 0x100}, 0x28) socketpair(0x7, 0x0, 0x9, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)) socketpair(0x3, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000005c0)={'bridge_slave_0\x00', 0x1000}) recvmsg(r4, &(0x7f0000000940)={&(0x7f0000000600)=@can={0x1d, 0x0}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000880)=""/166, 0xa6}], 0x1, &(0x7f0000000700)=""/2, 0x2, 0x7ff}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r5}, 0x48) socketpair(0x1, 0x2000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000000001f00bfa30000000000000703000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f2000000b7050000230000006a0a00fe"], &(0x7f0000000340)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x0, 0x6}, 0x0, 0x0, r3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x304) ioctl$TUNSETLINK(r3, 0x400454cd, 0x20d) recvmsg$kcm(r2, &(0x7f0000004a00)={&(0x7f0000003940)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a00)=""/4096, 0x1000, 0x6}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000004a40)={0x0, 0xb, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x101}, [@map={0x18, 0x0, 0x1, 0x0, r6}, @map={0x18, 0x7, 0x1, 0x0, r2}, @generic={0x5, 0x7, 0x20}, @exit]}, &(0x7f00000004c0)='syzkaller\x00', 0x5969, 0xe7, &(0x7f0000000780)=""/231, 0x41000, 0x1, [], r7}, 0x48) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000300)) 12:07:04 executing program 1 (fault-call:5 fault-nth:3): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)="fcb40b8f7e927e872effe8f05843338ea5f1dd581fce61fa0e802dd9b6a617312ee178494b0bb4566144cc5f4d80fb49c6d7936e7457fd009c96567216768b23e8281794eccc042576f1dbf46d3c8f5c949f7bda895fadd4b405a3b0ffdc60f02f32a5183755860200015f2c19dc16f0a3b792ec99ae55907f331cb411044b574ebda10bcb1b0d124617d15d40b22f1b87e97fd1d559a7af4fc69e70756b90e50000000000000000", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) 12:07:04 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00050000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000f0ffffead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 426.501849] FAULT_INJECTION: forcing a failure. [ 426.501849] name failslab, interval 1, probability 0, space 0, times 0 [ 426.513259] CPU: 1 PID: 25262 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #81 [ 426.520546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.529902] Call Trace: [ 426.532505] dump_stack+0x244/0x39d [ 426.536150] ? dump_stack_print_info.cold.1+0x20/0x20 [ 426.541363] should_fail.cold.4+0xa/0x17 [ 426.545457] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.550582] ? find_held_lock+0x36/0x1c0 [ 426.554654] ? print_usage_bug+0xc0/0xc0 [ 426.558719] ? is_bpf_text_address+0xac/0x170 [ 426.563220] ? lock_downgrade+0x900/0x900 [ 426.567374] ? check_preemption_disabled+0x48/0x280 [ 426.572405] ? mark_held_locks+0x130/0x130 [ 426.576649] ? __lock_acquire+0x62f/0x4c20 [ 426.580885] ? is_bpf_text_address+0xd3/0x170 [ 426.585379] ? kernel_text_address+0x79/0xf0 [ 426.589800] __should_failslab+0x124/0x180 [ 426.594056] should_failslab+0x9/0x14 [ 426.597864] kmem_cache_alloc+0x47/0x730 [ 426.601943] skb_clone+0x1bb/0x500 [ 426.605491] ? skb_split+0x11e0/0x11e0 [ 426.609378] ? kmem_cache_alloc+0x12e/0x730 [ 426.613700] ? build_skb+0x77/0x270 [ 426.617333] ? bpf_prog_test_run_skb+0x289/0xcb0 [ 426.622091] ? bpf_prog_test_run+0x130/0x1a0 [ 426.626502] ? __x64_sys_bpf+0x3d8/0x520 [ 426.630567] ? do_syscall_64+0x1b9/0x820 [ 426.634634] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.640011] ? kernel_text_address+0x79/0xf0 [ 426.644430] ? __kernel_text_address+0xd/0x40 [ 426.648934] bpf_clone_redirect+0xb9/0x490 [ 426.653188] bpf_prog_13013319041fa45f+0x6ce/0x1000 [ 426.658221] ? bpf_test_run+0x175/0x780 [ 426.662206] ? lock_downgrade+0x900/0x900 [ 426.666355] ? ktime_get+0x332/0x400 [ 426.670089] ? pvclock_read_flags+0x160/0x160 [ 426.674590] ? bpf_test_run+0x175/0x780 [ 426.678572] ? trace_hardirqs_off_caller+0x310/0x310 [ 426.683687] ? lock_acquire+0x1ed/0x520 [ 426.687661] ? bpf_test_run+0x3cb/0x780 [ 426.691638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.697181] ? check_preemption_disabled+0x48/0x280 [ 426.702210] ? kasan_check_read+0x11/0x20 [ 426.706359] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 426.711640] ? rcu_softirq_qs+0x20/0x20 [ 426.716109] ? bpf_cgroup_storage_release+0x220/0x220 [ 426.721306] ? skb_try_coalesce+0x1b70/0x1b70 [ 426.725814] ? bpf_test_run+0x25d/0x780 [ 426.729811] ? netlink_diag_dump+0x2a0/0x2a0 [ 426.734231] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 426.739779] ? bpf_test_init.isra.10+0x70/0x100 [ 426.744467] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 426.749249] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 426.754107] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 426.759662] ? fput+0x130/0x1a0 [ 426.762957] ? __bpf_prog_get+0x9b/0x290 [ 426.767032] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 426.771890] ? bpf_prog_test_run+0x130/0x1a0 [ 426.776325] ? __x64_sys_bpf+0x3d8/0x520 [ 426.780393] ? bpf_prog_get+0x20/0x20 [ 426.784217] ? do_syscall_64+0x1b9/0x820 [ 426.788278] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 426.793648] ? syscall_return_slowpath+0x5e0/0x5e0 [ 426.798580] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:07:04 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000000c0)=0x1) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) [ 426.803429] ? trace_hardirqs_on_caller+0x310/0x310 [ 426.808452] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 426.813475] ? prepare_exit_to_usermode+0x291/0x3b0 [ 426.818507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.823363] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:07:04 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000000)='cgroup.subtree_control\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x7f) openat$cgroup_subtree(r0, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:04 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000007000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:04 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001480)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000005c0)={r0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000018c0)=""/55, 0x37}], 0x1, &(0x7f0000001980)=""/115, 0x73, 0x1f}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000001800)={&(0x7f0000000fc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001040)=""/34, 0x22}, {&(0x7f0000001080)=""/165, 0xa5}, {&(0x7f0000001140)=""/85, 0x55}, {&(0x7f00000011c0)=""/84, 0x54}, {&(0x7f0000001240)=""/230, 0xe6}, {&(0x7f0000001340)=""/76, 0x4c}, {&(0x7f00000013c0)=""/191, 0xbf}], 0x7, &(0x7f0000001780)=""/80, 0x50, 0x9}, 0x40000000) sendmsg$kcm(r0, &(0x7f00000042c0)={&(0x7f0000003e00)=@can={0x1d, r3}, 0x80, &(0x7f0000004100)=[{&(0x7f0000004080)="b57e8fe9ae2b4d3688778c161c8aae3616b3f7994dd892d1", 0x18}], 0x1, &(0x7f0000004140)=[{0xb8, 0x10f, 0x1, "85794e2e6e97b3a2cbc2431bc3d4f129135536fff30e567937925771064c6443aff811ecdd11d1647ef5e068008093aa6bc78470b5d49d6c68a7d2cf167ecbb33e3ccef6fb2e190cc5798cfe5d24a22c4453fd6182a17b727bea8a4ff3d89e23d5491cf783f008e3e81b17366d58293f4b01f0939f990cb09eac9ca2c3c953c623f01f1170cd5020c28d946db06bece405034ad0a2557ad0b4a1f0552ee2b5327682"}], 0xb8}, 0x50) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f00000002c0)=@hci, 0x80, &(0x7f0000001540)=[{&(0x7f0000000340)}, {&(0x7f00000014c0)=""/99, 0x63}], 0x2, &(0x7f00000015c0)=""/194, 0xc2, 0x3}, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x8, 0x5, 0x6, 0xffffffffffff8001, 0x0, 0x1, 0x12, 0x2, 0x100, 0xe4e, 0xfffffffffffffc00, 0x100, 0x0, 0x81, 0x6d59, 0x4, 0x996, 0x1, 0x200, 0x0, 0x7, 0x800000, 0x7, 0x0, 0x8, 0x10001, 0x2, 0x0, 0x4, 0x40, 0xfffffffffffffff7, 0x10001, 0x4, 0x3, 0x7, 0x0, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x801, 0x2, 0x2, 0x1, 0x1, 0x57, 0x1}, 0x0, 0x5, r2, 0x9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="eac17f5c1570668ea7796b076458a25ebeb1ebbdc72d450ec825ed78bf379ff1115e9b3aa5277b60921f20f6b4aced780535460e893e8a155d0995d5461167943afec88c53b65008006510ba290ea56fcc9a07d945412a89765b84544e770698ec3a3552977091455a2487d1cadbd808c9283858ec708dce717d1e4d8d678536f2d5247547adb4fd7b0f44ff2da461e3fba4eb84685ed8d18f21", &(0x7f00000003c0)="d34010ef3fdc", 0x1}, 0x20) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000080)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="0e", 0x1}], 0x1}, 0x54) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0xf8) sendmsg(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000100)="0f00a7b6a0e106bb234ac5e21e7e", 0xe}, {&(0x7f0000000600)="a0f9aa55b630a350de2ed85861b53095e1842a25c97c7e994052e42422aa0f0ddc987f165e82315fef44e1c883c66f791f8c61541fed5024810e6b814d91e89d2f75def11cb2a352d4769c3e63427737e804ba449a80508d45ce191a328b0eccd9d114c6130c7bb4cf2efd1dc72f4004faa3c1135632fc6d9f9699b2fe39b5616fc3b88916e64bb9faa54c3a92b8220cc5c91c13f261bfada57ad81a4d2a2438a7ca5af13a83d56f6c1508b6e8d11f8368541db0", 0xb4}, {&(0x7f0000000580)="5ce02d33037e764edc8b04188a9f5f20b277e23a4a3c9566aa0bb5bfebdcffc1ba5eb8e6c58bde28c804b6833cda2fb3", 0x30}, {&(0x7f00000006c0)="457ef1d9a7a772368dcc47d2e94df8d972eddcbab0f4a2f9267aae3bc7b32244dd7020a25ccfa77acd07814249830046d3612c4636e0a4d42ee490b547bfb02982fd75f9fbeef4cf7c9513a9d45ca9aa5a2f652ead6a8b5a7eda70b293e274a071adde48ddb533cb2c55b112c580b165701dc0e07a8b88ace866b3356a120da1e489", 0x82}], 0x4, 0x0, 0x0, 0x8000}, 0x0) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4c6ee054239884", 0x7}], 0x1, &(0x7f0000000480)}, 0x0) 12:07:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)="83be7627b6cce510ddc717ee31c72095263cfa7e935b630200000000000000c46b7fb80cf31384058bc873120f2a9dee2df8459ed337cd221439df50ed56f5aa657c39b2db3633890daf4c7c57fab6730c375c937cd127cf", 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 12:07:05 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000002ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)={0x0, 0xed, 0x100000000, 0x40, 0x4, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000001480)={0xf, 0x6, 0x8000, 0xc6, 0x20, r0, 0x1000}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x6, 0x9, 0x2, 0x29, 0xffffffffffffff9c}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) recvmsg$kcm(r2, &(0x7f0000000380)={&(0x7f00000001c0)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000000240)=""/178, 0xb2}], 0x2, &(0x7f0000000340)=""/52, 0x34, 0x7ff}, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000012000)={0x10, 0x4, 0x4, 0x8, 0x0, r1, 0xfffffffffffffffd}, 0x2c) recvmsg$kcm(r2, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f00000003c0)=""/218, 0xda}, {&(0x7f00000004c0)=""/217, 0xd9}, {&(0x7f00000005c0)=""/165, 0xa5}, {&(0x7f0000000680)=""/121, 0x79}, {&(0x7f0000000700)=""/159, 0x9f}, {&(0x7f00000007c0)=""/213, 0xd5}, {&(0x7f00000008c0)=""/48, 0x30}, {&(0x7f0000000900)=""/154, 0x9a}, {&(0x7f00000009c0)=""/248, 0xf8}], 0x9, &(0x7f0000000b80)=""/205, 0xcd}, 0x40) recvmsg$kcm(r2, &(0x7f00000013c0)={&(0x7f0000000cc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000d40)=""/242, 0xf2}, {&(0x7f0000000e40)=""/127, 0x7f}, {&(0x7f0000000ec0)=""/46, 0x2e}, {&(0x7f0000000f00)=""/96, 0x60}, {&(0x7f0000000f80)=""/79, 0x4f}, {&(0x7f0000001000)=""/8, 0x8}, {&(0x7f0000001040)=""/219, 0xdb}, {&(0x7f0000001140)=""/98, 0x62}, {&(0x7f00000011c0)=""/20, 0x14}, {&(0x7f0000001200)=""/154, 0x9a}], 0xa, &(0x7f0000001380)=""/9, 0x9, 0x3}, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r3, &(0x7f0000000000), &(0x7f0000000040), 0xffffffffffffffff}, 0x20) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000001400)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000000c0)={r5}) 12:07:05 executing program 1 (fault-call:5 fault-nth:4): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:05 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00090000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:05 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000007ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:05 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0xd00, 0x297ef) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x2, 0x70, 0x3, 0x1, 0x550f, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0x800, 0x0, 0x7f, 0x2, 0x7f, 0x5, 0x0, 0x1000, 0x100, 0x0, 0x7, 0x9ba, 0x0, 0x8, 0x3, 0x5, 0x0, 0x0, 0x8, 0xffffffff80000001, 0x5, 0x5, 0x0, 0x1ff, 0x0, 0x6, 0x7, 0x8, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x100, 0x200}, 0x130, 0x34b9, 0x8, 0x0, 0x2, 0x3, 0x4}) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r3 = getpid() perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0xffff, 0x80000000, 0xfff, 0x6, 0x0, 0xffffffff00000001, 0x4, 0x8, 0xe61, 0x0, 0x4, 0x4, 0x22, 0x6, 0x0, 0xa3a4, 0x766, 0x0, 0x7f, 0x76, 0xd78, 0x0, 0xfffffffffffff42e, 0x6280, 0x0, 0xd5ed, 0xc9a, 0xfffffffffffffffa, 0x7, 0x28f97178, 0x3, 0x7, 0x4, 0x9, 0x0, 0x7ff, 0x0, 0x2, 0x2, @perf_config_ext={0x7, 0x7}, 0x1, 0xb2, 0x1ff, 0x8, 0x5, 0x0, 0x800}, r3, 0xf, 0xffffffffffffffff, 0x0) 12:07:05 executing program 5: socketpair(0x8, 0x8000a, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(r0, &(0x7f0000000400)="00128bfeeeb2dd8463", 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000017c0)={r0, 0xb55240bde031362c, &(0x7f0000000100)}, 0x553418fdaaa65b75) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r2, 0x7, 0x1, 0x0, &(0x7f0000000480)=[0x0], 0x1}, 0x20) sendmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)="603fc410f0c5c3447f5b5712e4ff19f5c4e8327238597c8aa252cffb7a34f00947461fdea5e90ce3a978f1c02066c586156000d719a1afb7886e0472323b0ca9e563f3f7e8517856a8fca2242b508e4f09139660", 0x54}], 0x1, &(0x7f00000003c0), 0x0, 0x800}, 0x4000814) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000000c0)={r2}) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)="2e2f6367726f75702e6e65742f2f2f7a308b09c3058a136e2dd0959bc310af8caddbbc1b47865b1c7cbbe71a4a259de470351d29e6", 0x1ff) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f00000003c0)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)) close(r3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000540)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup//yz1\x00', 0x1ff) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000005c0)="2f02726f0500000074617000895059372f91998a531db62cc9399668f301b3668ad02b47dd439dcf453f1bceff3b4f5a0000f53c017b937e826533825990f71ecf43cc723e062d7567f94471f903d0cd15d700000000008a590000ade64588ac747282000033b119c249699aa3fa179bcb8523b8bbf115b0caa8676a8f502a26bd7df6d7ad51d9a19610c67637cf11933fc0e8ca92d2a350fb693226e9adc3f1b0887a665276a739d2327ec94ef7c50e9b280c6caee6529e1e84dbedfca10979dacbfe37acdcb3a1ce98eedd26f8346331c69ed7a378b139c3fe6d42", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0xc0c0583b, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu/syz0\x00', 0x1ff) 12:07:05 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001480)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000005c0)={r0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001a00)={0x0, 0x0, &(0x7f0000001940)=[{&(0x7f00000018c0)=""/55, 0x37}], 0x1, &(0x7f0000001980)=""/115, 0x73, 0x1f}, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000001800)={&(0x7f0000000fc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001040)=""/34, 0x22}, {&(0x7f0000001080)=""/165, 0xa5}, {&(0x7f0000001140)=""/85, 0x55}, {&(0x7f00000011c0)=""/84, 0x54}, {&(0x7f0000001240)=""/230, 0xe6}, {&(0x7f0000001340)=""/76, 0x4c}, {&(0x7f00000013c0)=""/191, 0xbf}], 0x7, &(0x7f0000001780)=""/80, 0x50, 0x9}, 0x40000000) sendmsg$kcm(r0, &(0x7f00000042c0)={&(0x7f0000003e00)=@can={0x1d, r3}, 0x80, &(0x7f0000004100)=[{&(0x7f0000004080)="b57e8fe9ae2b4d3688778c161c8aae3616b3f7994dd892d1", 0x18}], 0x1, &(0x7f0000004140)=[{0xb8, 0x10f, 0x1, "85794e2e6e97b3a2cbc2431bc3d4f129135536fff30e567937925771064c6443aff811ecdd11d1647ef5e068008093aa6bc78470b5d49d6c68a7d2cf167ecbb33e3ccef6fb2e190cc5798cfe5d24a22c4453fd6182a17b727bea8a4ff3d89e23d5491cf783f008e3e81b17366d58293f4b01f0939f990cb09eac9ca2c3c953c623f01f1170cd5020c28d946db06bece405034ad0a2557ad0b4a1f0552ee2b5327682"}], 0xb8}, 0x50) recvmsg$kcm(r1, &(0x7f00000016c0)={&(0x7f00000002c0)=@hci, 0x80, &(0x7f0000001540)=[{&(0x7f0000000340)}, {&(0x7f00000014c0)=""/99, 0x63}], 0x2, &(0x7f00000015c0)=""/194, 0xc2, 0x3}, 0x0) r4 = socket$kcm(0x2, 0x5, 0x84) r5 = perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x8, 0x5, 0x6, 0xffffffffffff8001, 0x0, 0x1, 0x12, 0x2, 0x100, 0xe4e, 0xfffffffffffffc00, 0x100, 0x0, 0x81, 0x6d59, 0x4, 0x996, 0x1, 0x200, 0x0, 0x7, 0x800000, 0x7, 0x0, 0x8, 0x10001, 0x2, 0x0, 0x4, 0x40, 0xfffffffffffffff7, 0x10001, 0x4, 0x3, 0x7, 0x0, 0x0, 0x81, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x801, 0x2, 0x2, 0x1, 0x1, 0x57, 0x1}, 0x0, 0x5, r2, 0x9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000480)="eac17f5c1570668ea7796b076458a25ebeb1ebbdc72d450ec825ed78bf379ff1115e9b3aa5277b60921f20f6b4aced780535460e893e8a155d0995d5461167943afec88c53b65008006510ba290ea56fcc9a07d945412a89765b84544e770698ec3a3552977091455a2487d1cadbd808c9283858ec708dce717d1e4d8d678536f2d5247547adb4fd7b0f44ff2da461e3fba4eb84685ed8d18f21", &(0x7f00000003c0)="d34010ef3fdc", 0x1}, 0x20) sendmsg(r4, &(0x7f0000000440)={&(0x7f0000000080)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="0e", 0x1}], 0x1}, 0x54) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0xf8) sendmsg(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000100)="0f00a7b6a0e106bb234ac5e21e7e", 0xe}, {&(0x7f0000000600)="a0f9aa55b630a350de2ed85861b53095e1842a25c97c7e994052e42422aa0f0ddc987f165e82315fef44e1c883c66f791f8c61541fed5024810e6b814d91e89d2f75def11cb2a352d4769c3e63427737e804ba449a80508d45ce191a328b0eccd9d114c6130c7bb4cf2efd1dc72f4004faa3c1135632fc6d9f9699b2fe39b5616fc3b88916e64bb9faa54c3a92b8220cc5c91c13f261bfada57ad81a4d2a2438a7ca5af13a83d56f6c1508b6e8d11f8368541db0", 0xb4}, {&(0x7f0000000580)="5ce02d33037e764edc8b04188a9f5f20b277e23a4a3c9566aa0bb5bfebdcffc1ba5eb8e6c58bde28c804b6833cda2fb3", 0x30}, {&(0x7f00000006c0)="457ef1d9a7a772368dcc47d2e94df8d972eddcbab0f4a2f9267aae3bc7b32244dd7020a25ccfa77acd07814249830046d3612c4636e0a4d42ee490b547bfb02982fd75f9fbeef4cf7c9513a9d45ca9aa5a2f652ead6a8b5a7eda70b293e274a071adde48ddb533cb2c55b112c580b165701dc0e07a8b88ace866b3356a120da1e489", 0x82}], 0x4, 0x0, 0x0, 0x8000}, 0x0) sendmsg(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="4c6ee054239884", 0x7}], 0x1, &(0x7f0000000480)}, 0x0) [ 427.574803] FAULT_INJECTION: forcing a failure. [ 427.574803] name failslab, interval 1, probability 0, space 0, times 0 [ 427.586433] CPU: 1 PID: 25311 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #81 [ 427.593718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.603075] Call Trace: [ 427.605676] dump_stack+0x244/0x39d [ 427.609319] ? dump_stack_print_info.cold.1+0x20/0x20 [ 427.614521] ? check_preemption_disabled+0x48/0x280 [ 427.619543] ? zap_class+0x640/0x640 [ 427.623258] ? print_usage_bug+0xc0/0xc0 [ 427.627328] should_fail.cold.4+0xa/0x17 [ 427.631405] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 427.636515] ? zap_class+0x640/0x640 [ 427.640235] ? find_held_lock+0x36/0x1c0 [ 427.644311] ? is_bpf_text_address+0xac/0x170 [ 427.648821] ? find_held_lock+0x36/0x1c0 [ 427.652897] ? depot_save_stack+0x292/0x470 [ 427.657228] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 427.662333] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 427.667442] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 427.672029] ? trace_hardirqs_on+0xbd/0x310 [ 427.676366] ? kasan_check_read+0x11/0x20 [ 427.680525] ? trace_hardirqs_off_caller+0x310/0x310 [ 427.685643] ? unwind_get_return_address+0x61/0xa0 [ 427.690623] __should_failslab+0x124/0x180 [ 427.694875] should_failslab+0x9/0x14 [ 427.698696] kmem_cache_alloc_node_trace+0x5a/0x740 [ 427.703721] ? save_stack+0xa9/0xd0 [ 427.707350] ? save_stack+0x43/0xd0 [ 427.710990] __kmalloc_node_track_caller+0x3c/0x70 [ 427.715925] __kmalloc_reserve.isra.40+0x41/0xe0 [ 427.720697] pskb_expand_head+0x230/0x10f0 [ 427.724941] ? memcpy+0x45/0x50 [ 427.728244] ? __copy_skb_header+0x350/0x6b0 [ 427.732660] ? skb_release_data+0x880/0x880 [ 427.736984] ? __alloc_skb+0x770/0x770 [ 427.740891] ? __lock_is_held+0xb5/0x140 [ 427.744976] ? kasan_check_write+0x14/0x20 [ 427.749241] ? __skb_clone+0x6c7/0xa00 [ 427.753135] ? __copy_skb_header+0x6b0/0x6b0 [ 427.757547] ? kmem_cache_alloc+0x33a/0x730 [ 427.761905] skb_ensure_writable+0x3dd/0x640 [ 427.766320] ? skb_checksum_setup+0xaa0/0xaa0 [ 427.770828] ? kmem_cache_alloc+0x12e/0x730 [ 427.775155] ? build_skb+0x77/0x270 [ 427.778789] ? bpf_prog_test_run_skb+0x289/0xcb0 [ 427.783554] ? bpf_prog_test_run+0x130/0x1a0 [ 427.787963] ? __x64_sys_bpf+0x3d8/0x520 [ 427.792028] ? do_syscall_64+0x1b9/0x820 [ 427.796106] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.801507] ? kernel_text_address+0x79/0xf0 [ 427.805928] ? __kernel_text_address+0xd/0x40 [ 427.810438] bpf_clone_redirect+0x14a/0x490 [ 427.814782] bpf_prog_13013319041fa45f+0xda1/0x1000 [ 427.819837] ? bpf_test_run+0x175/0x780 [ 427.823830] ? lock_downgrade+0x900/0x900 [ 427.827988] ? ktime_get+0x332/0x400 [ 427.831720] ? pvclock_read_flags+0x160/0x160 [ 427.836218] ? bpf_test_run+0x175/0x780 [ 427.840200] ? trace_hardirqs_off_caller+0x310/0x310 [ 427.845321] ? lock_acquire+0x1ed/0x520 [ 427.849302] ? bpf_test_run+0x3cb/0x780 [ 427.853287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.858860] ? check_preemption_disabled+0x48/0x280 [ 427.863897] ? kasan_check_read+0x11/0x20 [ 427.868060] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 427.873348] ? rcu_softirq_qs+0x20/0x20 [ 427.877330] ? bpf_cgroup_storage_release+0x220/0x220 [ 427.882534] ? skb_try_coalesce+0x1b70/0x1b70 [ 427.887056] ? bpf_test_run+0x25d/0x780 [ 427.891062] ? netlink_diag_dump+0x2a0/0x2a0 [ 427.895487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 427.901036] ? bpf_test_init.isra.10+0x70/0x100 [ 427.905732] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 427.910509] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 427.915372] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 427.920922] ? fput+0x130/0x1a0 [ 427.924213] ? __bpf_prog_get+0x9b/0x290 [ 427.928285] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 427.933130] ? bpf_prog_test_run+0x130/0x1a0 [ 427.937550] ? __x64_sys_bpf+0x3d8/0x520 [ 427.941616] ? bpf_prog_get+0x20/0x20 [ 427.945443] ? do_syscall_64+0x1b9/0x820 [ 427.949511] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 427.954881] ? syscall_return_slowpath+0x5e0/0x5e0 [ 427.959821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.964671] ? trace_hardirqs_on_caller+0x310/0x310 [ 427.969706] ? prepare_exit_to_usermode+0x3b0/0x3b0 12:07:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00300000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 427.974752] ? prepare_exit_to_usermode+0x291/0x3b0 [ 427.979782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.984637] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:07:06 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)="504c20004cf7d12a07000000000000001e76de5d4ec18e4c2df01484a86d77842f624946eae310794ca926e6e866232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c552328739e8615c61049b8b1be6aa7740702cc5add00000000000000000000", 0x0, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x7}, 0x3) r0 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r0, &(0x7f0000000f80)={&(0x7f0000000800)=@nl=@unspec, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000880)=""/41, 0x29}, {&(0x7f00000008c0)=""/208, 0xd0}, {&(0x7f00000009c0)=""/215, 0xd7}, {&(0x7f0000000ac0)=""/227, 0xe3}, {&(0x7f0000000bc0)=""/66, 0x42}, {&(0x7f0000000c40)=""/19, 0x13}, {&(0x7f0000000c80)=""/222, 0xde}, {&(0x7f0000000d80)=""/147, 0x93}, {&(0x7f0000000e40)=""/90, 0x5a}], 0x9, 0x0, 0x0, 0x9}, 0x100) r1 = socket$kcm(0xa, 0x80000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)={r1}) 12:07:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000030ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00400000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:06 executing program 4: socketpair(0x47, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000003980)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000080)={0x0, 0x0}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 12:07:06 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)=@hci, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000140)}, {&(0x7f0000000240)="129f8b9403d68a498e1a1b5c7311eb9eb556ab489ea8c5895b2f6cbfc4b5aae4500c089fd3eb4bafa05bfb875563ae55ec3026abaca07746e8ad83967f2dee62ecc8811d865daf286d2716689502a8f0e24929488d4c82f37886d898bd1eb7bb38e668782eee1bcd28561d840a4f55564fe341cb110fe769aca3105250", 0x7d}, {&(0x7f0000000540)}], 0x3, &(0x7f0000000040)}, 0x0) r0 = getpid() socketpair(0x19, 0x6, 0x49fa, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x7, 0x5, 0x80, 0x1, 0x0, 0x6, 0x20, 0x1, 0xfbc2, 0x8, 0x2, 0x2a, 0xffffffff, 0x3, 0x0, 0x7, 0x3, 0x1, 0x80000001, 0x10001, 0x1f, 0x9, 0x62, 0x400, 0x2, 0x2, 0x1f, 0x0, 0xffffffffffffff6f, 0x6, 0x8, 0x3, 0x8, 0x800000, 0x1, 0x100, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0xd}, 0x880, 0x3ff, 0x10001, 0x3, 0x7fffffff, 0x6, 0x7}, r0, 0x10, r1, 0x9) socketpair(0x11, 0x803, 0x1d, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='tunl0\x00') socketpair(0xa, 0x5, 0x395b2d9c, &(0x7f0000000040)) 12:07:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000000e0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0e000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r1 = gettid() write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) close(0xffffffffffffffff) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x28, &(0x7f0000000240)}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={"6e72300100", 0x1132}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0xf, 0xffffffffffffffff, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000003c40)=ANY=[], &(0x7f0000000040)=""/23, 0x0, 0x17}, 0x20) r5 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f0000003c00)={&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @multicast1}}}, 0x80, &(0x7f0000003a80)=[{&(0x7f0000003a40)}], 0x1, &(0x7f0000003b40), 0x0, 0x20000000}, 0x80) write$cgroup_int(r4, &(0x7f0000000000)=0x8, 0x335) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x919) close(r4) openat$cgroup(r5, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) close(r4) 12:07:06 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49796e0c743ae1bbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abcf5d70df3fd352e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"6e72300100", 0x802}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0xe, 0x3, &(0x7f0000000540)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}}, &(0x7f0000000040)='GPL\x00', 0x2cbe, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0xf}, 0x48) mkdir(&(0x7f0000000240)='./file0\x00', 0x4) write$cgroup_int(r1, &(0x7f0000000000), 0x12) close(0xffffffffffffffff) 12:07:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000002000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0a000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:06 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000000)=@in={0x2, 0x4e22, @loopback}, 0x80, &(0x7f0000000140), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="10000000000000002900000032000000adf1f9ef3306372ca420477a121737f28dc9a123f71644c2b10f140e43562a7a4e5b51f6bc076f7038a7efbf7501c01e2d94bcec28f4949a3a59befcc96e6bfd67de9d3e3d98ae92149cad91cbef1631602cfffd7c9cdb9048e260b6103b748d2156ba8a0a75ef5bc4dd156efb79de46ad379fbfc9f66e0e0d9532d3a5d5d8b99dbe28ea0348878a9be6b6f1e4c8ade9630c688c98d0b3f9b6101d342df2e3fb143cc9025ce9093190bda19a817caab4dd96f230ebdf4ffbebe913fb"], 0x10}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000001c0)={r0}) sendmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f0000000200)=@ax25={0x3, {"6fd317938c7ccc"}, 0x4}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)="0049a3079414cea8e3d85b5f35b3606f146e14c7ac15f04e06978f56436ffece872bf1e94da915b63648ebc942d7faa6c2bc79a6144488a9f17b4315e5a0a99ebd2a863c0f6b015fa8936645f8268bcdb047026cf4c3d8c6a6e0db3d4340412ee2f431c4c6a6e92f54deadc319932d65a01afae835f46f6a60fffabd9bfbbbfcdda17c8345cc020fe49deb660e160c2c74279b858c3e59c323b74cfbdb81b7aff663d8a650c4331194219020e7312e91db9590e6691fe8cb222fdbed1e507278c3048d669271c4a152313fde01fe74276d38a4245fcc4d", 0xd7}, {&(0x7f0000000380)="9ef3ca70d5c3dea0838bb9ce94b86008b86f5b9f3bdb0e", 0x17}, {&(0x7f00000003c0)="49a2a7b1684b09227364848c3fcdf2af17d144907a3770df252dfcd6c1845f8a2d0ffd46c72fff5d6ba8cd56404ea33c2ebb7e45d20c1d0e1713bf035b0f4bf8c6b39eb4abbdd610c2c3fd18d56d2ed8", 0x50}, {&(0x7f00000004c0)="452c17b2047685e45f2d7dacbd07056829289018cb36fa9e11ea4840851ae5bdc7faad1808e16488bb40f92c23528f470d266a226f7529a73ca9f745743690466526676e63f643ea7a72df619bb0da88ee38d83286a068d509f6e39299ec6adc9700bc66df0f782e487be57909067dc3308d30fc2068ca91e5a117091d08c0da72d6981f36b1fc66e1733ce2d413c911846b499f4dec973048cd43105dc11df438ead49f298fb027c7a8a64e6deec637205030bbb2256cbc6f0801389c65866baa0e52553ab231051e0ebc78a68dadc475", 0xd1}], 0x4, &(0x7f00000005c0)=[{0xd8, 0xff, 0x3e, "1a302ed172f934f2a3888153e825ba8f933d648afc94354d32e226dbee04c69e96c8ae4908063424dc6decec01bb542b089dbf959ed130b45ce4a9d18440d2d5ae4c0284ef4e7f9669b27ffe10ec9b0a34c45e8a045b78e0330fe631e27acc68457e55123465476fcf6af9239e5ab9bf3a37e06a7d54049fe1a8a5f81b7107b23a31819f1e2bad2c358551f850865dc4318278dcf9a91f51a7113cadaa40afefac180f3bf416b3962f32009b003f12782b3a72d056ba316cf94382f0c028a015d9f52157afae"}], 0xd8, 0x4080}, 0x840) 12:07:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:06 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x8934, &(0x7f0000000040)) socket$kcm(0x29, 0x2, 0x0) 12:07:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2}, 0x2c) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) socketpair(0x4, 0x6, 0x4167, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 12:07:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000004000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:06 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x51c, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:06 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b04000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:06 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000009000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:07 executing program 3: socket$kcm(0x2c, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000000)) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000480)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x8d000000, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000580)="6d656d6f72792e648b656e74730095408739b87887010b64207d6824133493645c5ab6aeb7b238d6728d7dd49351359b2d307aa3c66634a546752bba350ccc49e28d0000000000000000", 0x0, 0x0) perf_event_open(&(0x7f0000000880)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup(r2, &(0x7f00000003c0), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000600)="2f67726f7574002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac752a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1c0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98ace3574511e0c61f722ff61f1db073657764c13f23ed76e9f5ad9b0a121d3019202a82a3e997831b6e1e10f53b98ab1eb37dc61e5717d51a0369715e1e92e66a6b80c82805f9df4f8a02c23d874f64ae00", 0x2761, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r5, 0x28, &(0x7f0000000140)}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000740)={r5}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000700)={r5, &(0x7f00000004c0)="61723129b7b8f76b7bb1541b9c4e396f408d39f2615f7384286d1941a3da2c52cb5d8ebf057ec68212efb78897d2b18bbef7aeda04bd97f4fab6c768b3b6787cc1fe934d28f6c7c57931808a11369ee4ee415575e4ac259a3f0d", &(0x7f00000002c0)=""/144}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)="2e2f6367726f75702e6e65742f73797a3002", 0x1ff) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000840)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x28, &(0x7f0000000080)}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)="6d656d6f72792e6576656e747300a0c6fc89fca4b92f08e13de9a6df6ae6e8cbb72096d96e5b58858fc90bcc4e1d8549b74068ce498f0a21a00882db4b59a80a54a06fde5644cd855350f94091dcd7a8a776d96c9e4e7ce49d34c821d27b043b4a5118bf9f2abeccea761f6b16ba8c7d72e31051cee1e8f567a1dc8d72bd97e70d5e0e9df906859b8871499e94ac6528d9b9c5af10dd9429b02291525f030eb6532c22a0b10208f0b715e4a13eb47c0192cff263b19f636688054a422a3ba65a3374455583e41a46b8bb408fdd7812a8676b0dc598fb0a782da3d5399bdb491ec9c2dd58a48094c82a4b3756dbe17a0847c9a6ac", 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000280)=r3) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x8) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000240)) write$cgroup_int(r6, &(0x7f00000001c0), 0x12) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[@ANYBLOB="6a18a82c1539f408a754024d528dd9220b18e93f"], 0xb) socketpair$inet(0x2, 0x6, 0xfe1, &(0x7f0000000100)) [ 429.163438] audit: type=1804 audit(1542110827.120:190): pid=25425 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir526025750/syzkaller.NbMYKE/645/memory.events" dev="sda1" ino=16517 res=1 [ 429.221543] audit: type=1804 audit(1542110827.180:191): pid=25420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir526025750/syzkaller.NbMYKE/645/memory.events" dev="sda1" ino=16517 res=1 [ 429.262156] device nr0 entered promiscuous mode [ 429.272848] audit: type=1804 audit(1542110827.230:192): pid=25435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir526025750/syzkaller.NbMYKE/645/memory.events" dev="sda1" ino=16517 res=1 [ 429.299497] audit: type=1804 audit(1542110827.260:193): pid=25435 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor3" name="/root/syzkaller-testdir526025750/syzkaller.NbMYKE/645/memory.events" dev="sda1" ino=16517 res=1 12:07:07 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)="2e0f660225da61702f73797a3000", 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB=':'], 0x1) 12:07:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x2}, 0x2c) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) socketpair(0x4, 0x6, 0x4167, &(0x7f0000000000)) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x127) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 12:07:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000007000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:07 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000fffffffeead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:07 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f000000af40)={&(0x7f000000ad40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f000000ae80)=[{&(0x7f000000adc0)=""/177, 0xb1}], 0x1, &(0x7f000000aec0)=""/114, 0x72, 0x7}, 0x40000020) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0f400000000b7060000ffffffff2d6405000000000065040400010000000404130001000000b7050000000000006a0a00fe00000000850000001200000085577de2b14b47cd9500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffd, [], r0}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="dea1f34e48", 0x5}, {&(0x7f0000000040)="fa583370284137c62c38a66e50ff14b86c7c6bb8b11b3ade9c188d99", 0x1c}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x158, 0x8040}, 0x8000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x0, 0xe, 0xc2, &(0x7f0000000080)="52d3814e7fffff3bad6c48eff04c", &(0x7f0000000380)=""/194, 0x8dc}, 0x28) 12:07:07 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000002c0)={'veth0_to_bridge\x00'}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000540)) r0 = gettid() r1 = perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x9, 0x6, 0x1ff, 0x1, 0x0, 0x0, 0x0, 0x2b3bb4516d94f23c, 0x5, 0x0, 0xd2, 0x6, 0x0, 0x0, 0xffff, 0x2, 0x8000, 0x4, 0x80000001, 0x10, 0x200, 0x3, 0x2, 0x3, 0x9, 0xffffffff, 0x2, 0x0, 0x4030acbd, 0x7, 0xbd1, 0x8, 0x9, 0x1, 0x800, 0x1000, 0x0, 0x1, 0x2, @perf_config_ext={0xfffffffffffffffa, 0x4}, 0x624, 0x0, 0x200, 0x0, 0x400000000000000, 0x1, 0xbf05}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0xd5, 0xfffffffffffffff7, 0xb7, 0x8957, 0x0, 0x1, 0x400, 0xf, 0x5, 0xae5, 0x3, 0x6, 0x7f, 0x7ff, 0xffffffff, 0x0, 0x8, 0x3d, 0x3, 0x9, 0x1ff, 0xfffffffffffffff9, 0xcf7, 0x5, 0x1ff, 0x80000001, 0x20, 0x5, 0x1800000000000000, 0x1, 0x400, 0x4, 0x81, 0x80000000, 0x3, 0x5, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x200, 0x400, 0x1, 0x0, 0x3, 0x4, 0xfffffffffffffe01}, r0, 0x9, r1, 0x3) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000640)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000d80)={&(0x7f0000000a40)=@can, 0x2d54ef73d4fafe5b, &(0x7f0000000b80), 0x2, &(0x7f0000000280)=""/53, 0x2f3, 0x5}, 0x40002020) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0xfb, &(0x7f0000000340)=""/251}, 0x48) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000a00)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000bc0)="2f67726f7574002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac752a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1c0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98ace3574511e0c61f722ff61f1db073657764c13f23ed76e9f5ad9b0a121d3019202a82a3e997831b6e1e10f53b98ab1eb37dc61e5717d51a0369715e1e92e66a6b80c82805f9df4f8a02c23d874f64ae00", 0x2761, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0xd, 0x0, 0x9, 0x5, 0x1, r3, 0x9}, 0x2c) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x2}) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x3}, {0x80000016, 0x0, 0x4}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000680)="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") bpf$PROG_LOAD(0x5, &(0x7f0000007540)={0x0, 0xa, &(0x7f0000000dc0)=ANY=[@ANYBLOB="25140c005400051e080000009cb8aff9d28ca4cef0710000005bdf9007d87b86000000000000003752000076f09a000000000097808ff2c8738ded7d1105c3aef8c5a478ac991eca7297fe52e6f6c2ff16421ffe8c83ab7599e09e25a167e9cc626acbe3f8e45f0b50292701803b1b405d163dc802d59733d33bfe117782a5fee30d5a3254e6e65d6d05e72c248f5791ac85bd23dada5153a6f4577bcf12f1f90e6b4907a54d5354a92ada62513a8cdeb322f13e26ddad9eb4b2bfb1ecd086"], &(0x7f0000000b40)='GPL\x00', 0x4, 0x1000, &(0x7f0000002bc0)=""/4096, 0x41100, 0x1}, 0x48) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000b00)}, 0x0) recvmsg$kcm(r4, &(0x7f0000002b00)={&(0x7f00000002c0)=@sco, 0x80, &(0x7f0000002940)=[{&(0x7f00000003c0)=""/200, 0xc8}, {&(0x7f0000000900)=""/194, 0xc2}, {&(0x7f00000015c0)=""/197, 0xc5}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/215, 0xd7}], 0x5, &(0x7f0000002a00)=""/216, 0xd8, 0x3}, 0x40) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x1, 0x0, 0x0, 0xffffffffffffff9c}, 0x2c) 12:07:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681ba0018000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:07 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000f00000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:07 executing program 4: socketpair(0x15, 0x80f, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x2, @multicast1}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000480)="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", 0x1000}], 0x1, &(0x7f0000001a40)=[{0x1010, 0x11f, 0x7, "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"}], 0x1010}, 0x40) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000200)) write$cgroup_type(r3, &(0x7f0000001900)="746888646164656400", 0xfdef) 12:07:07 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000f0000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 429.928377] device nr0 entered promiscuous mode 12:07:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$unix(0x1, 0x45, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000140)=r0, 0x4) sendmsg(r2, &(0x7f0000001380)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000500)}, 0x0) 12:07:07 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681bfffff000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r2 = socket$kcm(0xa, 0x40122000000003, 0x11) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f00000008c0)=ANY=[@ANYBLOB="6070f6fff750af22931942b7164f91b8c97f233496d771064bb6afd83d57f04d8c767f95f3650b080000000000000033257183d09d7ba422153e0c145287f45b29ef3bc561374ccbdae503990b2f519c2eacdda80d40953ca882a0559700fe41b675b058c13ab9e8ac360ad4d67aa1f133d506060cdcc58b55d1a3ea30996eb8fff6465f69da3291f8560cb231ebca7675314343248ae9bae044242a7aeea9d49cc0b00000155c559d39971553fde12220614aead7272a52349b7b5c9e75f3"], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x24, &(0x7f00000001c0)=r3, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x2fd) r4 = socket$kcm(0x29, 0x7, 0x0) r5 = socket$kcm(0xa, 0x2, 0x11) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000380)) sendmsg$kcm(r2, &(0x7f0000000800)={&(0x7f0000000740)=@ipx={0x4, 0x0, 0x10001, "8318cfdbc3b2", 0x400}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f00000008c0)=ANY=[], 0x0, 0x20004010}, 0x4000) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000680), 0x4) setsockopt$sock_attach_bpf(r5, 0x29, 0x1b, &(0x7f0000000040)=r5, 0x52d) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', r3}, 0x10) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)=@generic={0xc, "ddf95228adcb80d455a64ea96b388c597669d14253d4c01472089f2cfd33ee18601957bc7a0ee267debd46825d7baa4d9ff4e47649ba1ba27857ff311486d58cb08b2eb1bed032bbb59941c2626fde700c63a1aa80847916e8d614a8e84b706c2aff16592e209b8b80a7e685e9f9d3aaa59d695e36cb12585ccbda1b29d8"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600), 0x0, 0x8001}, 0x20048014) recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can, 0x80, &(0x7f0000000f80), 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x40000102) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x800) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f00000005c0)={r5}) socket$kcm(0xa, 0x8000000, 0x11) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000600)) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) close(r5) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) setsockopt$sock_attach_bpf(r6, 0x6, 0x4, &(0x7f0000000140)=r6, 0x1e4) mkdir(&(0x7f0000000140)="2e02", 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003840)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000000c0)}, 0x0) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000580)={r2}) 12:07:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000008000a0ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:08 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000000003eead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00600000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:08 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000000400)=ANY=[@ANYBLOB="bf1600ff0300000000000000050000006d00008510000002000000bf01f4f7b023770000000095000000000000004501000000000000b7000000000000009500000000000080000000000000000000000000000000151433907cd7e8b44089603e615f15488d7afd91178a4320a1b6b7f06d58265111d3260b97fe9175f2014ddc061a6d458feb1eb58e3207ac72757525b4e5075115330632db9520c596b229ce0e"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x1, 0x7, 0x7f, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', r2}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r2, &(0x7f0000000300)="07c680ff4cf14251c35124dc4f00b8b7706f19102ced1e99a5a0c2bb30855bdea1438f321bfe5cd8d468a76535fa09570b9c8d1ba5bb3cef21acba48410f4da8cb4863705a3176af1ec9532c7780ff839c65bc644e9a7cafc0e107a38f09c95a839c9c0a223915bef7c8b8c8912980175349130121ccaf5088e54c2e6aebc6cd", &(0x7f0000000380)=""/16}, 0x18) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) socketpair(0x19, 0x807, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r3, &(0x7f0000000200)="77bba4f19a5436e39b485b0ce0b0797d06df4f2e6754d475ee4dcfa5ae7f7b838ac1084bb1947b780384dfee853af679567b830754604bad11f6729de03dafe35a19b0b757e1b0eec8c18d9a83ab6eca67f65b234539f75129bcc1dbf32a"}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000200)="470107000000") perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$kcm(0x2, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000005c0)={0xffffffffffffffff, r5, 0x0, 0x12, &(0x7f0000000440)='./cgroup.cpu/syz1\x00', 0xffffffffffffffff}, 0x30) openat$cgroup_procs(r4, &(0x7f0000003700)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c9f5a537a66377bbc", 0x43}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x89a0, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000a00)={r6}) ioctl$sock_kcm_SIOCKCMUNATTACH(r6, 0x890c, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9c84a2c00d2970403dc0d") gettid() openat$cgroup_procs(r4, &(0x7f0000000980)='cgroup.procs\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000380)={'bond_slave_1\x00', 0x600}) 12:07:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000fffff000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00feffffff0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000001ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:09 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.memory_migrate\x00', 0x2, 0x0) r2 = getpid() socketpair$inet6(0xa, 0x80000, 0x1, &(0x7f0000000200)) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x80000000, 0x1cd, 0xff, 0x6, 0x0, 0xfffffffffffffff7, 0x10802, 0x4, 0x9, 0x0, 0x81, 0x2, 0x6, 0x0, 0x4, 0x7f, 0x3ff, 0x5, 0x17d3, 0x9, 0x200000000, 0x8, 0xd5, 0x8, 0x7, 0x7, 0x4, 0x1, 0x0, 0xd22b, 0xd7, 0xb02, 0x3ff, 0x0, 0x6, 0x4, 0x0, 0x1, 0x6, @perf_bp={&(0x7f0000000040), 0x5}, 0x10000, 0x7fffffff, 0xcaa2, 0x2, 0xef74, 0x9, 0x401}, r2, 0x2, 0xffffffffffffffff, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000100), 0x36b) 12:07:09 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000100)=')vmnet1\x00', 0x0}, 0x30) r2 = perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0xffffffffffffff80, 0x80000000, 0x4ff, 0x0, 0x0, 0x4, 0x8000, 0x4, 0xf8, 0x7, 0x300000000000000, 0x7fff, 0x3, 0xaf, 0x40, 0xe55f, 0xffffffff, 0x1000, 0x100, 0x8001, 0xffff, 0xda83, 0x4, 0xfffffffffffffff7, 0x1, 0x20, 0xfffffffffffff001, 0x10000, 0x5, 0x9, 0x7fff, 0x2, 0x9, 0x3, 0x4, 0x8000, 0x0, 0x8000, 0x1, @perf_config_ext={0xa3, 0x3}, 0x2020, 0xfff, 0x3, 0x0, 0x6, 0x200, 0x12000}, 0x0, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x1000000000, 0x9, 0x17b1, 0x10000, 0x0, 0x2, 0x4000, 0xb, 0x5, 0x9, 0x5, 0x8, 0x4a, 0xfffffffffffffff8, 0x7, 0x4, 0xfff, 0x1f, 0x9, 0x7, 0x1000, 0x700000000000000, 0x3ff, 0x5, 0x1, 0x4, 0x3ff, 0x8, 0x80000001, 0x80000000, 0xffffffff00000001, 0x2, 0x8, 0x5, 0x35ab, 0x2, 0x0, 0x7ff, 0x4, @perf_config_ext={0x2, 0x39}, 0x4000, 0x100000001, 0x0, 0xb, 0x8, 0x1, 0xffffffffffffffff}, r0, 0x7fffffff, r2, 0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, r2, 0x0, 0x2, &(0x7f0000000200)='#\x00', r1}, 0x30) close(r3) r4 = socket$kcm(0xa, 0x2, 0x87) sendmsg$kcm(r4, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000000440)=[{&(0x7f00000004c0)="36d8c1ea0dd4", 0x6}], 0x1, &(0x7f0000000100)}, 0x0) 12:07:09 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x6e9717f90cf7ed41, 0x80807, 0x3, &(0x7f0000000280)={0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x80, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000380)="6e7230080260a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") socket$kcm(0x29, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xd6, &(0x7f0000000480)="6e7230080260a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e", 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0xffffffffffffffe1, 0xffffffffffffff33, 0x0, 0xdf9c, 0x0, 0x8, 0x0, 0x1, 0xff, 0x6, 0x7fffffff, 0xffffffff, 0x9, 0x6, 0x40, 0x6, 0x6, 0x3, 0x6, 0x3, 0x6, 0x81, 0x4, 0xf4ae, 0xd, 0x5, 0x7592800000, 0x4, 0x5, 0xffffffffffffff80, 0x2, 0xfff, 0x7480de6a, 0x1, 0x3, 0xfffffffffffffffd, 0x0, 0x8, 0x1, @perf_bp, 0x800, 0x1, 0x8, 0x3, 0xe5, 0x6, 0x2}, r3, 0x9, r0, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xa, 0x0, 0xfff, 0x101, 0x20, r2, 0x6}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xf5, 0x4000000000000000}, 0xc) write$cgroup_int(r1, &(0x7f0000000300)=0x5, 0x12) 12:07:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000003e0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00fffffffe0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:09 executing program 4: r0 = socket$kcm(0x29, 0xfffffffffffffffd, 0x0) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@rc={0x1f, {0x6, 0x7ff, 0x9, 0x7931, 0x100, 0x8601}, 0xffffffff}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000100)="fc658c6465d505c255ac437830f2cc7b5bc4bfd27f24689ca086562c277228b7c4505a3ad8afb3fcb8db02f7a26729c0c5cb262dc4ddda9d73c5a255919310d87400a303fea487de16b043b8e3192da9e454d384489b28f3ca614d3ec11e2103131bd7165fdd8bd4b66cfec04ef3ecbe6e4ee749675bdac65cff2f74dfe55e94adf41e6faf2a45537061802c1dc632888ad2c18bd0e5a4e5b441300e1e01da444a66c712e908008df34e9c8f7db16507eeba95902c6f4429ca42dc18b957e2dce823735e61e376f766216d3494950c575110a0c4ba3c698aacda003c83f94cd4594e1d84f3fb2f580840e7cd3c536eb6eb84c97f", 0xf4}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000000080)="c7bdd99b47e3c4dbe04d4509f16447187fa744859e2b631488ffbf9cc14365dfcaaae595b9c6febebf6bf0", 0x2b}], 0x3, &(0x7f0000001240)=[{0x38, 0x110, 0x9, "6b0751f6a65a322736bea309723d1d32cd1c131a16dfe7a18b698bfc4fa97cfb61"}, {0x10, 0x197, 0x7}, {0xb8, 0x10b, 0xbb6, "88580290a6275a831786abdeaa778f3354c8ffc41462085c374b5d8ea35b21a8138bfd9dada6da7ccaf9397f21038925b2d383da5b9268314453f7aa8e43e06002d5f49e531471d68f7260be80912315fe382ef9140b2be4341862b9faaf77579d406f2127b1f29aeed87ca8ead0f3b3b6b370ee3dd09891b82e3e7f6d5a6754f5183cd6f792aba63070204d36f0ea560cf2ce0e0283b0e53bf2c21ddb298d03629c"}, {0x80, 0x103, 0x80, "f2b5392be8451db80bd48b1817ce95aa281e47e1326bd174869ac3a6c8f7c0e08b00235c089f31a04f638c17a2274b89a0b336e9d8c55329dccc3660cb12124a00e5661a89aa159bfbfe2065934603c15b873d5bf7781d3a66064ebd2bab684700aa4a327faf64fcef76"}, {0xd0, 0x11e, 0x80, "0f07ba9b391756de8f4e966db3f3255fd2e3fc5b7bee807eee9301d4724dab94287b3603f2f9706e2c1648da5664d1c64fe1e2bc82d48a7c5ae21234ca4195cbacef5d33a7dcea8e828efb71594eec43d5adf11964b55c61746d150c3a3d3bdd9d4bfbc8cf8f859163b7a9af2c782855e6d435bb927d092148d9ca09b2507f91fbfa378056d9e15bd8af83709a980f5f26dc68ba0dff947cc863e1a271ed696cd882508afb6435c4ad96d58ac32a7180cb296a43c03f198ad4"}], 0x250, 0x20044041}, 0x14) r1 = socket$kcm(0x10, 0x3, 0x0) recvmsg$kcm(r1, &(0x7f0000002840)={&(0x7f0000001500)=@l2, 0x80, &(0x7f0000001580)=[{&(0x7f0000001640)=""/246, 0xf6}, {&(0x7f0000001740)=""/165, 0xa5}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x3, &(0x7f0000002800)=""/22, 0x16, 0x3ff}, 0x2) recvmsg$kcm(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003d80)=[{&(0x7f00000015c0)=""/86, 0x56}, {&(0x7f0000002980)=""/219, 0xdb}, {&(0x7f0000002a80)}, {&(0x7f0000002ac0)=""/238, 0xee}, {&(0x7f0000002bc0)=""/161, 0xa1}, {&(0x7f0000002c80)=""/235, 0xeb}, {&(0x7f0000002d80)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0x7}, 0x22) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000002880)="1300000014008152915a7b5267d7d1370a2ff821d82ad325e6a23cc580e2dbdff7126815a318613dad5f39074d3365baa917dc215de1578b5cbc77ea335b11b46e4a6afd8b2b4a67678e9a2c4c19afafaa12f8dea39e28e43bbac14b380c36951af90e07f5c7bf9fa72a9885b8e686264099e795cfa40ee19ef3735dd365f1668c9d4d7f8d992c7546967a130f2c374711f802c75caa752f139939508958b375f0f291c24a01fa15b4e563f8d088307e165291afbd02fe", 0xfffffffffffffec6}], 0x1, &(0x7f0000002300)}, 0x0) recvmsg(r0, &(0x7f0000004100)={&(0x7f0000003f40)=@can={0x1d, 0x0}, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003fc0)=""/52, 0x34}, {&(0x7f0000004000)=""/180, 0xb4}], 0x2, 0x0, 0x0, 0x400}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000004140)={0x4, 0x2, &(0x7f0000002a80)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000003e40)='syzkaller\x00', 0x6, 0x8f, &(0x7f0000003e80)=""/143, 0x41000, 0x1, [], r2, 0x5}, 0x48) sendmsg(r0, &(0x7f0000004600)={&(0x7f00000041c0)=@pppoe={0x18, 0x0, {0x1, @broadcast, 'nr0\x00'}}, 0x80, &(0x7f0000004480)=[{&(0x7f0000004240)="01", 0x1}, {&(0x7f0000004280)="ef4cd4fe66f36cfece0f97b3a5e37f74d21829c75acd03cdec3366c8aabcfb22191904a77a87fbb2e7922af71f45e591ede3ccff7c3a40e2011e45dc7b0e31c96a058f690f4a7cdc399793099ad263bb7624df0be7aee64a417d061faeec2e199abf5944f6458b508f", 0x69}, {&(0x7f0000004300)="4dfa59801f8efa2354c251db8a8911a3f15cb72c099a1878ddabe97fa785f8d6f712f718f7cfe95451cd4d86f1ec8f88560a796c5291f9e5aa0c13c537cc11a3f4775dad147568fb8389ab128e64ea88a1d441a811c0fa61f017", 0x5a}, {&(0x7f0000004380)="b537a7a037ce70a95c26532209669af1e9901e7a88f90323467809d24d3b5562c59ecb3c1b71c91a3067a3f269e3a75812bcdf830afb460b", 0x38}, {&(0x7f00000043c0)="68e77bd53a1cb6d21e3011eda010a18522f0545b1fa6396bd88b85bb3952fa05a752e06be3904c", 0x27}, {&(0x7f0000004400)="1b342a674d6961239fd7d4447381827c025c7b203eddb4ea85abdf8d4a9043e39dccf5b61f3e19ba5c75bbdd35bbedd58d2506ae3015a101a8f5513644c6be5517c79f53a6e06b36de72e55f719b3cecedccddf3f3eb89e1", 0x58}], 0x6, &(0x7f0000004500)=[{0x100, 0x0, 0x1fa5, "a3ec4704306d050bab316980289cc942bfdf483bed8a9d0befdc6423192a64c05ea475f4ce1033a5066616d313829d329a0cce4b8211833b5fd29e41c3db42bd6e955f13b2121f6255bcfe26fe70300d6244ca536332ddd9dbf580418da37926989efa2d37c49eeeccb06d681c1bc441ccd612158a26dd6bdca2b69851b9bffbc7e417a5ec91d0dd875acc79e32e1f1f4009741d4b999fc9843a42feb943fa0ff5086ff332858fd64c7e2f8c3cbe2a1246d4ee5da8a4963984271a66fee421e9093513cc8f4ba4da4c8d18cab5853185b82a845390db9e6d49603d30768be3a4cf9529b8ffef82ba7830e1a3fa2067"}], 0x100, 0x4}, 0x4000094) socket$kcm(0x29, 0x0, 0x0) 12:07:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000f000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:09 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000180000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:09 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={"000000000000000000e9dc00", 0x200082}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000340)='-ppp0[vmnet0\x00') socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r1, &(0x7f0000000200)="02ae081c9477795ae5455e1cd24e7352e5b7a6472e26219eb35e2a03e2c5415f1b411abc199098dd92fbe044737ab234e7b66cf4a3d34cfc08362686657568433ad8769cfd40b5f9", &(0x7f0000000280)="258b2e3900c4c059393b4f169f40df960f7df641cecd6430839a2808aeb8a4b232be90f79ed811f03178fd7adb29c65be37574d88b8d39309b65027fc71d310a6d7ecd8f34955b4042c4985392f5109f4d2deeff1f98cb1fbe9ebc", 0x1}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r1, &(0x7f0000000480)='cgroup.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 12:07:09 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b003e0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:09 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:10 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x80002, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, &(0x7f0000000000)='%d') r3 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x8, 0x2, 0x0, 0x0, 0x2, 0x8840, 0x5, 0x6, 0x20, 0x3, 0x3f, 0x0, 0x9, 0x0, 0x7390, 0x1, 0x5, 0x6, 0x8a2, 0x9, 0x9, 0x8, 0x4, 0x4, 0xf6b3, 0x1, 0xfff, 0x9, 0x1, 0x79, 0x0, 0x5, 0xde8c, 0x4, 0x4, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f0000000200)}, 0x1c000, 0x7, 0x5, 0x2, 0x1, 0x100, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000440)={0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='%d'}, 0x30) perf_event_open(&(0x7f00000004c0)={0x3, 0x70, 0x3, 0x3, 0xffffffff, 0x100000000, 0x0, 0x1f, 0x8, 0x1, 0xb6e, 0x8, 0x30000, 0x400, 0x81, 0x9609, 0x8, 0x5, 0x100000001, 0x90b2, 0xfff0, 0x2, 0x1, 0x1, 0x2, 0x29, 0x400, 0x6, 0x3, 0x6, 0x166d, 0x5, 0x3, 0x7, 0x0, 0x9, 0xc36, 0xa635, 0x0, 0x8, 0x6, @perf_config_ext={0x5}, 0x40, 0x6, 0x100000000, 0x0, 0x5, 0x0, 0x8000}, 0x0, 0x9, r0, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x200, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x9, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000480)=r2, 0x4) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000340)) write$cgroup_pid(r2, &(0x7f00000005c0)=r5, 0x12) perf_event_open(&(0x7f0000000600)={0x4, 0x70, 0x6, 0x5a2, 0x4, 0xffff, 0x0, 0x5, 0x1086, 0x5, 0xf4, 0x81, 0x7, 0xffffffffffffff01, 0x7, 0x8, 0x1, 0x1, 0x40, 0x80, 0x100000001, 0xba42, 0x800, 0x0, 0x6, 0x8, 0x3ff, 0x3, 0xffffffff, 0x3d5, 0x5, 0x3ff, 0x4, 0x100000000, 0x800, 0xfff, 0x3, 0x6, 0x0, 0x80, 0x0, @perf_config_ext={0x400, 0xaba}, 0x5988, 0x7fffffff, 0x8, 0x800000000000a, 0x400, 0xffff, 0xfffffffffffffffe}, r5, 0xd, r1, 0x9) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000240)=r2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x7, 0x1, 0xa30, 0x7f, 0x0, 0x100, 0x5fadd64618d046ee, 0x8, 0x459, 0x3, 0x8, 0x0, 0x8, 0x1, 0x8, 0x1, 0x7ff, 0x1000, 0x80000000, 0x1, 0x800, 0xfffffffffffffff7, 0x100, 0x77c5, 0xffffffff, 0x2, 0x20, 0x1, 0x2, 0x200, 0x9, 0x0, 0x2, 0x100, 0x100, 0x3, 0x0, 0x1ff, 0x5, @perf_bp={&(0x7f0000000380), 0xd}, 0x20000, 0xf1, 0x5, 0x6, 0x1, 0x6, 0x200}, r5, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000540)={0x5, 0x70, 0x4, 0x8, 0xfffffffffffffff9, 0x100, 0x0, 0xfffffffffffffffe, 0x800, 0x8, 0x0, 0x9, 0x9, 0x9, 0xff, 0x7, 0xc00000000, 0x2, 0x7, 0x225c58fc, 0x0, 0x2282, 0x1000, 0x2, 0x6, 0x2, 0x9, 0xfffffffffffff88d, 0x3, 0x3265, 0x1, 0x3, 0x2a1b, 0x6, 0x0, 0x24f0, 0x66ccd65c, 0x9, 0x0, 0xedf, 0x1, @perf_config_ext={0x20, 0x100000001}, 0x9000, 0x9ee0, 0xc8c, 0x0, 0x1000, 0x5, 0x8}, r5, 0x1, r3, 0x2) 12:07:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000600000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xedf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000280)=@nfc={0x27, 0x0, 0x1, 0x7}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000300)="50cd4df8635e336d898043840b3535fc7624fe810104a189377c736e124e60d682964bf8f37c85cefc0de68457c2ea4e6fe2643258f9379c42419d002598a46d3d289e1d3ce6f09ab643bb", 0x4b}, {&(0x7f0000000380)="5070275949228c45b86fbcb291094a792213025eb8f1435f133f7512c48af959d1550c5fa51f189161992476825836312f7ca58854e18a8fe4d4da2db85a3a8ea705e8eafe96808b1f4b8cc6109f7e3140e8f1dc2cd0be2b1bc189edbffccb1c51478d34c448389b80dc06f1a5bb5e1cde316587a7f9112cfd91a3263aed282ce1d813bd4afbdc83b2132bac241989e53dbd1cd4d28ca5b8437dac925ff6940512053e2d5196471e55e5aad934cc3c2d1f22adb16fdf8776b10eb87e70a00d2b1f", 0xc1}, {&(0x7f0000000480)="ab870d5c7bc765f6a982b1ec360d79b69a1c26b22ca584d36781c481304194b87f0bfff284f51bea2ed0f09162bd7058af8e27ffaf69064d6588837920b9f1a4627c3a56265ddc1981400d52", 0x4c}, {&(0x7f0000000500)="3e6f88f665ac24bad7ee09b8b462fe4cd1fa3b465aaaa9bf2d837ea225209c05fa69aa5f04b02c83ac1c6862c0f95211adb00741a86e3fdac282196c4955ea077e", 0x41}, {&(0x7f0000000600)="d8bd8dbbf45ad2d124da784fd14c65d866a29c1021e5caf11a0e42a71d6037f4438cf0b2edb262c626dc5f3332dd30ab0a700a8467ae9ec6203fc4717acdfa8f8bf9f95b04bc905f5411015420f618b74af3e22ddb0048c283b2f12acbfe6ffa99445b59c9722905d44579eb1a118a5474b7b25c78c70f28c4cda888d97d85cb7a6135e779088dfeceeee5a03f39208774309d0df0c98306ca10dc757f65e9c9898ff122cb28e9350c8de49835d18682762900387b7bc287c5c571873f", 0xbd}, {&(0x7f00000006c0)="6dc4b0de209d8d76424fc94c3fc0708c98efe3a02d460157188ae59598c9eeb7cc28a7b7a6b2da408c74907f6a2dc2a496a0f26d21ac4100072d377bafcbeced3143248395eb60dabcba7c4451a0888d764879404dfda44cf437dcd708c28fc5eca617aed4acde24c26f1aa14c3c78c955dcb0663445e993f6a382e8871468c090df4b373dc2e82d6d2528ae70104e85aed685bf6ba33ac29f3d02dd81f1b543d20b7dd0ecd7cb6514ca3f26ef13360a7a764a4cff84d046e305ab00921322b651065bd99666f03c0a9de166d3d559097e8d8ce20c9291733b8c", 0xda}, {&(0x7f00000007c0)="ccdfd9cbf1dc2f6de75e8919d04e09c715ad071f6e3acb56986417552e3a95081558fd3384e17fa81c88eda757a5be33c7a92155352aa787a34f79ac50c97fe75be723b93d73b707af0a8388591e9d15a3c8e13cc14392e676a36ca24ae4e92ff954c15300a73fd3a930bb20c01fdbdd2b05", 0x72}], 0x7, &(0x7f00000008c0)=[{0x110, 0x103, 0x3, "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"}], 0x110, 0x8040}, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stat\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40086602, 0x7fffff) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)) write$cgroup_type(0xffffffffffffffff, &(0x7f00000005c0)='threaded\x00', 0x9) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r2, r1}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00', 0x8}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040)='threaded\x00', 0xb5) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0x9) write$cgroup_type(r2, &(0x7f00000000c0)='threaded\x00', 0x9) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) 12:07:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000003f0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000060000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) 12:07:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000003e000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:10 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0x5300}]}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0xffffffffffffffd0, &(0x7f00001a7f05)=""/251, 0x10000000000000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x200, 0x8, 0x6, 0x20, 0x1, 0xffffffffffffff7f}, 0x2c) 12:07:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00050000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x3e8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x3, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000200)}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x8, 0x0) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080), &(0x7f0000000400)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x40) 12:07:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000a000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00008001a00000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000240)=@rc, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000480)=""/97, 0x61}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="140000001a000700e4050cf1948bb3f1fa7d47f5c00fea0c73", 0x19}], 0x1, &(0x7f0000000080)}, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r0, &(0x7f0000005540)={&(0x7f0000004fc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000005480)=[{&(0x7f0000005040)=""/70, 0x46}, {&(0x7f00000050c0)=""/210, 0xd2}, {&(0x7f00000051c0)=""/208, 0xd0}, {&(0x7f00000052c0)=""/145, 0x91}, {&(0x7f0000005380)=""/106, 0x6a}, {&(0x7f0000005400)=""/105, 0x69}], 0x6, &(0x7f0000005500)=""/57, 0x39, 0x8}, 0x2003) bpf$PROG_LOAD(0x5, &(0x7f0000005580)={0xb, 0x7, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x838}, [@alu={0x4, 0x2, 0xf, 0x7, 0xa, 0x6, 0xfffffffffffffffc}, @alu={0x7, 0x9, 0x5, 0x5, 0x0, 0xc, 0xfffffffffffffff0}, @map={0x18, 0xf, 0x1, 0x0, r2}]}, &(0x7f00000001c0)='syzkaller\x00', 0x81, 0xfa, &(0x7f00000002c0)=""/250, 0x41000, 0x1, [], r3, 0x8}, 0x48) 12:07:10 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x0, 0x70, 0x2cab, 0xfffffffffffffffb, 0x8, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x7, 0x0, 0xffffffffffffff81, 0x1f, 0x1ff, 0x80, 0x101, 0x0, 0x8, 0x8, 0x23, 0x800, 0x0, 0x0, 0x7, 0x0, 0x100, 0x9, 0x0, 0x8f3b, 0x0, 0x8a, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xe}, 0x0, 0x1f, 0x50, 0x1, 0x5, 0x1}) recvmsg$kcm(r0, &(0x7f0000004d40)={&(0x7f0000004c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004cc0), 0x0, &(0x7f0000004d00)=""/31, 0x1f, 0x7f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000004d80)={0x3, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x81}, [@exit, @alu={0x7, 0x100000000, 0x7, 0x0, 0xf, 0xffffffffffffffc0}, @ldst={0x0, 0x3, 0x0, 0x5, 0x7, 0x100, 0xfffffffffffffffd}]}, &(0x7f00000002c0)='syzkaller\x00', 0x3b, 0x1e, &(0x7f0000000300)=""/30, 0x41000, 0x1, [], r1, 0xa}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x4, &(0x7f00000000c0)='EPL\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x10000000, 0xffffffffffffff00, 0x7fffffff, 0x8, 0x0, 0xddf, 0x4440, 0xd, 0x30, 0x5, 0x4, 0x1, 0x4, 0x1f, 0x3, 0x1, 0x81, 0x3, 0x3, 0xffffffffffffff88, 0x0, 0x0, 0x9, 0x6, 0x1e194, 0x40, 0x9, 0x10001, 0x1, 0x1, 0x800, 0x7fff, 0x8, 0xffff, 0x200, 0x5, 0x0, 0x6, 0x1, @perf_config_ext={0x2, 0x3}, 0x10004, 0x4d, 0x1, 0x9, 0x2, 0x5, 0x5}, r2, 0xe, r0, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 12:07:10 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:10 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000a0008000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:10 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffff9c, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg(r0, &(0x7f0000017040)={&(0x7f0000016e40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000016f80)=[{&(0x7f0000016ec0)=""/174, 0xae}], 0x1, &(0x7f0000016fc0)=""/79, 0x4f, 0x33}, 0x40002103) bpf$PROG_LOAD(0x5, &(0x7f0000017080)={0x11, 0x3, &(0x7f00000002c0)=@raw=[@map={0x18, 0x4, 0x1, 0x0, r3}, @ldst={0x0, 0x3, 0x6, 0xf, 0x2, 0xfffffffffffffff0, 0x8}], &(0x7f0000000300)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x1, [], r4, 0xf}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x62f47fbe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r5, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000000080)="b90703e6681b00000000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141424e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc1826979747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'teql0\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x5) 12:07:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x0, 0x70, 0x2cab, 0xfffffffffffffffb, 0x8, 0x9, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x7, 0x0, 0xffffffffffffff81, 0x1f, 0x1ff, 0x80, 0x101, 0x0, 0x8, 0x8, 0x23, 0x800, 0x0, 0x0, 0x7, 0x0, 0x100, 0x9, 0x0, 0x8f3b, 0x0, 0x8a, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0xe}, 0x0, 0x1f, 0x50, 0x1, 0x5, 0x1}) recvmsg$kcm(r0, &(0x7f0000004d40)={&(0x7f0000004c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000004cc0), 0x0, &(0x7f0000004d00)=""/31, 0x1f, 0x7f}, 0x42) bpf$PROG_LOAD(0x5, &(0x7f0000004d80)={0x3, 0x6, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x81}, [@exit, @alu={0x7, 0x100000000, 0x7, 0x0, 0xf, 0xffffffffffffffc0}, @ldst={0x0, 0x3, 0x0, 0x5, 0x7, 0x100, 0xfffffffffffffffd}]}, &(0x7f00000002c0)='syzkaller\x00', 0x3b, 0x1e, &(0x7f0000000300)=""/30, 0x41000, 0x1, [], r1, 0xa}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x4, &(0x7f00000000c0)='EPL\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x10000000, 0xffffffffffffff00, 0x7fffffff, 0x8, 0x0, 0xddf, 0x4440, 0xd, 0x30, 0x5, 0x4, 0x1, 0x4, 0x1f, 0x3, 0x1, 0x81, 0x3, 0x3, 0xffffffffffffff88, 0x0, 0x0, 0x9, 0x6, 0x1e194, 0x40, 0x9, 0x10001, 0x1, 0x1, 0x800, 0x7fff, 0x8, 0xffff, 0x200, 0x5, 0x0, 0x6, 0x1, @perf_config_ext={0x2, 0x3}, 0x10004, 0x4d, 0x1, 0x9, 0x2, 0x5, 0x5}, r2, 0xe, r0, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000007ed0040bfa30000000000000703000028feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000006f460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], &(0x7f0000000100)='EPL\x00'}, 0x48) 12:07:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000018ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x4}, 0x0) socketpair$packet(0x11, 0x1, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000002480)=@ipx={0x4, 0x1000, 0x2, "1698865bb757", 0x7}, 0x80, &(0x7f0000002540), 0x0, 0x0, 0xfffffffffffffe87, 0x800}, 0x4000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f0000001340)="92f2e93632be5653dc9bae7e1bc856f4ed019c0cb6659fc737396c3aa1a671c0d2c1ffec9bb251b94da54bd098f7782cd27b2419a1ac12ec0d6a502fa361e8ecdeaa010db2049ba801e79e58bf6c8c656c2e19f1e162acea5f24f1d25ac5663219d647e73d36c95b99dc6113e3f70cc21b4705590ac2e6ef3472fa8eaff4e30f718695ae350032236b694dffd9260b40cc99b91c400b276eac11a3e86ea40626660340db01ec94ed9473d11c12cd64240224c7685e057a4c06066eee562788c9be9376", &(0x7f0000001440)=""/204}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001640)={r1, &(0x7f0000001540), &(0x7f0000001600)="6c25b2b943fe265d7a1d99549d", 0x2}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='io.stat\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001680)={r1, &(0x7f0000000080)="925fc1606d814e940ebc3616", &(0x7f0000001bc0)=""/224}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r1, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001780)={&(0x7f0000000140)='memory.stat\x00', 0xffffffffffffff9c}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001700)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000004c0)='memory.events\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001940)={r1, &(0x7f0000001840)="66180ca5f5aeee4607cad5be2d0cf1d770e4caaaecb779bc6f4056e2b4667e66842f3c8c2196fa5c63e4c64d18f0023f1f506a081dc39b93478f1f84644c83e88b45a6a2c8785c8d0628fb8251631800edffd943ab4762a8e88d80998a52115b52a18de0e336012ecd4e6fb1bcc9b0c697", &(0x7f00000017c0)=""/99}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x9, 0xe5a, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) openat$cgroup(r3, &(0x7f00000015c0)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000001740)) 12:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000180000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000a0018000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xa, &(0x7f0000001000)=ANY=[@ANYBLOB="505d2dec0000000085100000050000006d00000000000000bf610000000000008510000002000000bf0100000000000095000000000000001501000000000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x1ff) 12:07:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x4}, 0x0) socketpair$packet(0x11, 0x1, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000002480)=@ipx={0x4, 0x1000, 0x2, "1698865bb757", 0x7}, 0x80, &(0x7f0000002540), 0x0, 0x0, 0xfffffffffffffe87, 0x800}, 0x4000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f0000001340)="92f2e93632be5653dc9bae7e1bc856f4ed019c0cb6659fc737396c3aa1a671c0d2c1ffec9bb251b94da54bd098f7782cd27b2419a1ac12ec0d6a502fa361e8ecdeaa010db2049ba801e79e58bf6c8c656c2e19f1e162acea5f24f1d25ac5663219d647e73d36c95b99dc6113e3f70cc21b4705590ac2e6ef3472fa8eaff4e30f718695ae350032236b694dffd9260b40cc99b91c400b276eac11a3e86ea40626660340db01ec94ed9473d11c12cd64240224c7685e057a4c06066eee562788c9be9376", &(0x7f0000001440)=""/204}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001640)={r1, &(0x7f0000001540), &(0x7f0000001600)="6c25b2b943fe265d7a1d99549d", 0x2}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='io.stat\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001680)={r1, &(0x7f0000000080)="925fc1606d814e940ebc3616", &(0x7f0000001bc0)=""/224}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r1, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001780)={&(0x7f0000000140)='memory.stat\x00', 0xffffffffffffff9c}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001700)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000004c0)='memory.events\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001940)={r1, &(0x7f0000001840)="66180ca5f5aeee4607cad5be2d0cf1d770e4caaaecb779bc6f4056e2b4667e66842f3c8c2196fa5c63e4c64d18f0023f1f506a081dc39b93478f1f84644c83e88b45a6a2c8785c8d0628fb8251631800edffd943ab4762a8e88d80998a52115b52a18de0e336012ecd4e6fb1bcc9b0c697", &(0x7f00000017c0)=""/99}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x9, 0xe5a, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) openat$cgroup(r3, &(0x7f00000015c0)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000001740)) 12:07:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x4}, 0x0) socketpair$packet(0x11, 0x1, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000002480)=@ipx={0x4, 0x1000, 0x2, "1698865bb757", 0x7}, 0x80, &(0x7f0000002540), 0x0, 0x0, 0xfffffffffffffe87, 0x800}, 0x4000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f0000001340)="92f2e93632be5653dc9bae7e1bc856f4ed019c0cb6659fc737396c3aa1a671c0d2c1ffec9bb251b94da54bd098f7782cd27b2419a1ac12ec0d6a502fa361e8ecdeaa010db2049ba801e79e58bf6c8c656c2e19f1e162acea5f24f1d25ac5663219d647e73d36c95b99dc6113e3f70cc21b4705590ac2e6ef3472fa8eaff4e30f718695ae350032236b694dffd9260b40cc99b91c400b276eac11a3e86ea40626660340db01ec94ed9473d11c12cd64240224c7685e057a4c06066eee562788c9be9376", &(0x7f0000001440)=""/204}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001640)={r1, &(0x7f0000001540), &(0x7f0000001600)="6c25b2b943fe265d7a1d99549d", 0x2}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='io.stat\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001680)={r1, &(0x7f0000000080)="925fc1606d814e940ebc3616", &(0x7f0000001bc0)=""/224}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r1, &(0x7f0000000540)="bd40b28b79078fa8f16e09dba883d34b85882396eaf58995b90dbc7b1a041d14e2bc18f8892798b6024d6aae5110361b909e7a2ab66135247dda03cb06ad82f4f4e9c2cc3c0c800d9e0c300a5b5966df4a89aba438a45480c88dc704911e2ca18c58938d7e9a0b6cff532953bb9d530cea49b3a44f6fabc12c4f597845a13dd250a6e28c8b3771720c82dc9846d78741ed265b549157e23e78cb42c5b297aabc44a17b6edf78ef9fe2cf386aa5e0abbe3379a9ae4a1fb3d942ad3eae29b9cb08410a3cd3c13904720ee9fb416f96fda3091943c07afc2448d510e60152d630a01381296ce9a36269d37b8e936d02955a263ce43d3903cc3c28ffd9a31a77552b6d159751da28bdc5ebec9ed45a63ca7a1dce7f323ab14dccd7feda9b74be83200ab2f6f7413b244dfc49debb821b6798b9267a6086a23eb1dfb9614a7ef4a5cf8b95fd59be0c2165bde32f9f752c41e818a7f60d3af516cb4538e39217cf15052e2286c1aeda94b309e9d4883e7035a0c93c37ca926d1028a3eabecfda94f175472cc4bdf18a99c4fbc29fba3e31c3749da8e6c28d0845dc0d9883f6251428364cb1005e763a1a17a58fc135396fa9cb96e7257c5f9ef140164361dbdb2d877126bb39143259e1bdea78cbe892b58650dd3be219914a355c9245f1e8a6ee8706094d58eb154af019d281095246ba3b9ead4ae664feee0e0bef626fa1255f2c8a373118438bbc84ac011dcba9d04495d3720f62320a6da471388b68ae2a18a94f6688fb2afef36578142e4bca80f0ae78dc5e70ebd300179734c3d666499ea60c0098f567a847288f7e82b23ec2f5a0a91d548b776559c164473b8d51cdd83dfe28ca327015c99d073a4f148c15ea1a9a8d51b971b7376f4dc1c665ef8d5b85185ce135c0f22b2412760d980fe011af8214c1567b1f26ae169ffe8ea567c025b85e607422ce0d16e3e93ea2de508cf373c0f8563902cabae3a56d935254661036242a75a3176b0af19340961c782e3a71bad9608884de1a0d0c44f11189cf87d6f6bfc86d5003bc42df6edd38bf2e30742d64a2e943f88968e41447bbeaf1777f4028b8c6dcee8ef1db28cc1482d11d6003e0df62623f95c65a40ccf5639c4dd6ddaee3236b0edfb35a34ccd74428bbb369a9487527223c3b89fa309da0b091c1f906cb598f366aea12c2574368dff9cd49e5d52e6a7483518e5825cdb517200dbeb5a565a0221fad51e50fe7b498535acda8fc6c216296750514ea894a990a254d8449faacdc856c979f81e80bf4f33e3fd742bb6330dd04cbd757170386e03b17111b1587408c6bface9e04d2a9a93e5f556daf18e5d95c1cccd0b9ae6592219547b90414977ec4cc7af5d2c38a06da735bf507112794addb520f71b16aa4819d7f9751131da216d0abff30434c43257edd82557695e0cadb6365034ce7657c262ec218245e102ff8a54a802b93bd0d6766a51864cd2ea4343c03a7420943431c3cf511bb43fc803f26285eaae9ec2a12c0c8746da16b71f84c1c72c6cc2fc501c1955ec0173c0fbc924c7658db4f3e0be06ac9489d42594d82637da3956930fe622860ebef21856e5901f6114bea931d20e7b0d344945738b9933a005ee7b9e3c9d2fb6087dbaaa450df6a79f811e784bd6f1dfbc374b9306d06cb87b201f4d6343feb038cbf5b867e151a0ca42ffd8fa388816f49a5d3a7871f6cdc0fa8d20891c58278b6ec13ac3058e5a4c90020734eb8703c84e53f8a326a822e48a263bca81ce73336390abb7361ef8261ecb843f4fab678c23441155f5166f16804a185f20051628d79c9087d42b58f3f5a25747c67c5e3de41b59c8bf89ee63bcae138dc09bc836ebec2e4cb597cd67d7afd1d7cc579efd65109c43038b12d31bfe3e9da2d187829e34be0d685dba1f7415c29a3aad9564a7f2023034e3768cf5a8f67c3a646b7d68e1d811a97e54ec0f66c11dec48ba081b57cc53a4e65925e22c842004452bfb2f8ee8c0491d863bc1250632c3ef91e9dc364a5d4ee801b0bba0bed4f16fe5465ae867c87b16fab807f4adaab62aa6087dd4eb3ac4ccb322db2eeb3350928a38ef7f6b8b76ed4042f6a757a05fee7e50f2cf22896b9a37fafee4da4bc49644dc1f07cdf0c1a75762286e13bff638018103a05e1138a6576629c04c95f0982f7042e2e0fb464230f9aa664f7f3a219363be99596d937f01a2161ef6c2e817b5c61a20e30925ebb28ed163d3c2de41be3171c9914f43c0ae77bfe187cb4ced89792ec22b4c3607bfe71573dc06c2fa4ae58f4beae45d9d1c30674678aecbbce37677977c66e8479ca25ddc2f50cdb0a14e67ac35a85c1d9ee910413a906ef7fcf9c02f5a2ee99f84e7e8834880a75b1f42a24f13aa87757a492811311f88aff105bac7ff7f24b475c6a49c5ec58185e9c96bffb09df04540514b17ead020c4e99820c4ca8b5a25e161dc0cf0f9ae5dc6d38e630b04cf26f33ece94d3e4d015f6fc0bad1430801339c9096720a14da4427c17b20e9e6d7a12777165d157aeb660dd86bc184f72d9709a5602ca852e079cc9cd7d5b52f204032b86daff5bc751ad0234f95c6efbfdcb91b41d43e249fbdff41a12d409a148c04cb51d2e5591417511d21d80d76e4bf6bd433420d776b469acbd30281052a51e40313dd30c1be92312721fc3cf0fa68111d2be9e4f2b19fad781d1603bf0c6bb59406159effc85f79d3a85f8eb3019857698f22906e80df5620a5c725dba0c62a0e61720fb622eddbd77605c7c084194ee5efaab6bcd1e149907cd0834629b316b7fab089929ed0352bb44115a0c55315fc81c25d718dacd04effd287f71a34bc39e502d053eda58e652672354124552b453c4c797d4620fd32255fa532881d3e569c84c221132eaad648f8a79a568222a7c2f00878244cedea261f6dd0c25fc5bb941361b17b8407c393908d240424709c2de8b5f4a45b2afc16782c7f923e8ba868e6918788ec7fefbd81395b0f8bae8aac8cd248da2c278c2303eb97db5a2108d8fda116f9624ac8fae3b6e5293aec8a670ad0d2daf4cd1bbdb7d574e0158a730d9817656d0e0150864da8617b3559cbd14342821bac76966dbd53cbbee81356820cd65e47177242435a8b86569e37824b22df3e5ad145cf95244aa191471fc34d7a97728b0948c308423e08bff4d8f379efbd659db3b7b0ee0fc6d77ab4e519102bc94df15d49d243a2c020f068b3456d6d0c4505e1d0b357611bac99c9e8ac594e44047d577ba9b11d51f179e587871c88dcdb80afc56ad251d7acef5c97d32670f315c7bdcefa37cfd4102ed97d868aa4ae478de8bceef343dd7f9338105aea6c35b653131be4cd59812eb32fce221b73fb6bccb0adfb10a76710fc3703c5e7c207bdafe704934da7fa192fe40082358050828fc5fe229eaf12d6265bf2593a5dc746edab181db183a695509a30cc474cbcb7226d4fa27dc7e7bdee7f00ab9eb79c57996cca986e7a33378a2abc47988f8342a4e2e34544c560b5d73aa24a607ce39dd08cf866ccd2154509a3654bac316c4911398165da0b024b737589df0917ef86c41787600f7dc2c870d11d753ca09a4a2d477eee99697d60e61b", &(0x7f0000000280)=""/132}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001780)={&(0x7f0000000140)='memory.stat\x00', 0xffffffffffffff9c}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001700)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000004c0)='memory.events\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001940)={r1, &(0x7f0000001840)="66180ca5f5aeee4607cad5be2d0cf1d770e4caaaecb779bc6f4056e2b4667e66842f3c8c2196fa5c63e4c64d18f0023f1f506a081dc39b93478f1f84644c83e88b45a6a2c8785c8d0628fb8251631800edffd943ab4762a8e88d80998a52115b52a18de0e336012ecd4e6fb1bcc9b0c697", &(0x7f00000017c0)=""/99}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x9, 0xe5a, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) openat$cgroup(r3, &(0x7f00000015c0)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000001740)) 12:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000400000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:11 executing program 5: ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000040)="76657400000000492edd47790d2a7aa6001664c41b65b0761f061c7f7f3d3a024289552e9dfe") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) 12:07:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000018000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000a00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@ax25={0x3, {"b8738e610d62ed"}}, 0x80, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x4}, 0x0) socketpair$packet(0x11, 0x1, 0x300, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x82, 0xb, 0x200000080}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000000300), &(0x7f0000000400)}, 0x20) sendmsg(0xffffffffffffffff, &(0x7f0000002580)={&(0x7f0000002480)=@ipx={0x4, 0x1000, 0x2, "1698865bb757", 0x7}, 0x80, &(0x7f0000002540), 0x0, 0x0, 0xfffffffffffffe87, 0x800}, 0x4000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r1, &(0x7f0000001340)="92f2e93632be5653dc9bae7e1bc856f4ed019c0cb6659fc737396c3aa1a671c0d2c1ffec9bb251b94da54bd098f7782cd27b2419a1ac12ec0d6a502fa361e8ecdeaa010db2049ba801e79e58bf6c8c656c2e19f1e162acea5f24f1d25ac5663219d647e73d36c95b99dc6113e3f70cc21b4705590ac2e6ef3472fa8eaff4e30f718695ae350032236b694dffd9260b40cc99b91c400b276eac11a3e86ea40626660340db01ec94ed9473d11c12cd64240224c7685e057a4c06066eee562788c9be9376", &(0x7f0000001440)=""/204}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001640)={r1, &(0x7f0000001540), &(0x7f0000001600)="6c25b2b943fe265d7a1d99549d", 0x2}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000480)='io.stat\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001680)={r1, &(0x7f0000000080)="925fc1606d814e940ebc3616", &(0x7f0000001bc0)=""/224}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r1, &(0x7f0000000540)="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", &(0x7f0000000280)=""/132}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001780)={&(0x7f0000000140)='memory.stat\x00', 0xffffffffffffff9c}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001700)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000004c0)='memory.events\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001940)={r1, &(0x7f0000001840)="66180ca5f5aeee4607cad5be2d0cf1d770e4caaaecb779bc6f4056e2b4667e66842f3c8c2196fa5c63e4c64d18f0023f1f506a081dc39b93478f1f84644c83e88b45a6a2c8785c8d0628fb8251631800edffd943ab4762a8e88d80998a52115b52a18de0e336012ecd4e6fb1bcc9b0c697", &(0x7f00000017c0)=""/99}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x9, 0xe5a, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x2c) openat$cgroup(r3, &(0x7f00000015c0)='syz0\x00', 0x200002, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000001740)) 12:07:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x868, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x18000000ffffff7f, 0xe, 0x29, &(0x7f0000000000)="b90703e6680d698cb89e40f088a8", &(0x7f00000000c0)=""/41, 0x101}, 0x28) 12:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000900000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000005ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:11 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:11 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) r1 = bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x3, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f0000000000)="fd1a1dc098f161edc1d9c9307e7dc3820831c58d3ba89457a7d87379"}, 0x10) r2 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r2, 0x6, 0xc, &(0x7f0000000180)=r1, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x9, 0x1, 0x7, r0, 0x1000}, 0x2c) 12:07:11 executing program 3: r0 = getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x30bfecb6, 0x2b2e, 0x8, 0xde57, 0x0, 0x9, 0x300, 0x6, 0x40, 0xab9e, 0x401, 0x3f, 0x9, 0x6, 0x800, 0x8, 0x5, 0xff, 0x7, 0x7, 0x8, 0x0, 0xc00000000, 0x400, 0x5, 0x6, 0xff, 0x8001, 0x2, 0x9, 0x401, 0x6, 0x6, 0x3, 0x101, 0x8, 0x0, 0xd5d, 0x4, @perf_config_ext={0xf, 0x1b9}, 0x20000, 0x4, 0x9, 0x0, 0xf499, 0x6, 0x81}, r0, 0x2, r2, 0x8) getpid() 12:07:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00040000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:12 executing program 5: socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000000140), 0x1000000000000010, &(0x7f0000000400)=[{0x0, 0x11d, 0x7fff, "59522a75f473bc23cad9"}, {0x0, 0x101, 0x40, "0f6a5541e60843167d2b69b9b4b45a43b221e7525016985fe3c8e0d2ab90fa14bc5588c3cb07e2fc131847f259eca78a352ed2b5b68f0b582b7da148ad6e6f48b7f63fc68043e43ad988507a50dedc6448e52d2cc0cd3c2e649fa23496b74257f00813d264ea0dff55e0c499cac0ee5e445bd8b4c421bf5bdeefff2c6ef1be67798f2dcb71418214667bffe89024cb15428f4acba174c920d12f09d2d11e451c31"}, {0x0, 0x100, 0x0, "56de563f97f277f577ee51e5d90b56961f394b039e088ba188e1139c95b3b0c5f57e452de534483cc0c693a79851f9358e54d9d091e5a73f8e006703bf25d51bb3635ae1c2b798033f466623550b67fa2dcefc78d9f83b4487bd398e3691febdda9a3f562ed2c8872e9e1434501da4ce71fde0619a384c8feff87d"}, {0x0, 0x118, 0xd6, "62b8ba09f9b7d37315cdc9be9adec3e95989e0b5b220977f15e3e0"}, {0x0, 0x11f, 0x3, "0ddc4174c64718564506b08650a082c723d10ab185b963e688554110118429085f572d79af68d1e70dbb9f46f4691375e472650fc15c5b34f55e659490f5a42df07b4218c92f3826c2209d5c4e8b8d4b57914b2b5fe0c23149b2e783ec670f6482725dd67cd2f5b97ecc1ceee4d258c24e"}], 0x0, 0xfffffffffffffffd}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="230000004f0081747801000000f869d9ef1b0cd9080001000000000000000020000000", 0x23}], 0x1, &(0x7f0000000a00)}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 12:07:12 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000000000eead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:12 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$kcm(0x11, 0x1000000000000003, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) setsockopt$sock_attach_bpf(r2, 0x107, 0xf, &(0x7f0000000200), 0x4) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x3) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31100, 0x0, 0x5, @dev={0xfe, 0x80, [0x20000380, 0x0, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x3c1, &(0x7f0000000380)}, 0x0) sendmsg(r1, &(0x7f00000001c0)={&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x3, @empty, 'bcsh0\x00'}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000003c0)="ecafd7fc5ad6ba27e50479e3755a0db37f51dba2423b6ff40741fa598d1b05933066cc6339c1b926e337ced815d488823137a8f58a9b5c4902a9a57e6607f626deadd14b54e8006689ad367c17e680c2bd0778db2909ebf5", 0x58}, {&(0x7f0000000640)="e494805d420b45163d2f541e9ecfcad477976ea4ba9981ce82fee10b2f9f947734c394f68a1af685c168ca1282d24c5eb397bac3a9df275824c7cd5c456a1fa1b958854ec1641d69c605833f8d942811016160fd5e781c754059b9d6f80c4cb982263b5d76fcdae560d3a7cd166f843dc8ddeb1d43d797267e4354eb959146794b7c0befe80e1ffc72791b7f4191057693512aa91f95f4102f1e4cc20a466e46426ad41f85e6efdc79248dc7ef5669d52c148556b1d8e982c44d0ddd01deab4620a13bef5e88f73716b1a1c0cd5651ce0434c1097342b1d212", 0xd9}], 0x2, &(0x7f0000000740)=[{0x108, 0x105, 0x1, "85bdecf50c8e425da038ae004e4606bcba22d80c20a79b7e2daa27f3a6fcd3019d0814dcbf93cfe5b95d4a4d17e68ef938b529467bfea63895d894258ce2a9f526885990347c55c0493c977137312269c6c639e08ebba3ac5af3d2678ed001829f66211bf98f5b16cffd3e727129e8234d41dcb5b11fa7b86c32f7bfa9426978a5f951ae278e5a2755702c03831adec0107995578f77d1a11904b8c693e9219b396d9b406e09552a37db393de4b8198d9dbff5814c45cfccae0bebf8021d993d3a85d57440b09e747d22649719aa8c8dabc270bf12b119d807e18813be4785cbd2daaa5f1cc93edcd5f02acf32508857a8"}, {0x30, 0x109, 0x9, "1939e02b7a3b5e608f63b8d02e98feb7ca996ff29e2599c2e65a"}, {0xf0, 0x103, 0xc7d, "b815f8923306ab1461a30435a6254eaea3e04384d1c6d4ca3e47794fe0484c5b5c7176e26c5e367411aaad1ca7bd1952ebb124b5da3725fb3fb0438e9716dff3b51bae3a471768da2971d9532a4bd7795ec86f0c11d5e134fb637e9bb57c6ffe607c95fb5381e97c3004a09b7942c338fba3db5cdec622d25c1804238d9d1063817844a8da61c42f54b1bf7c7072117abf013af786d928f7e4906088ff48d58254a243340ee06de0cd0f6ce8567a390f7d943eab6c4dfc58f7a45dc10d168572ee7e693ed6813657a0e5cca65696dfab4a152f96f4ae10b82851fb1ab841"}, {0xd0, 0x117, 0x80000001, "8644c359761f8a6b7cac526dff3f75da688bea1f56e17a9ebd4fad49d1131d2bf5f7f63d322478a20623d69312b2f13503dff3932f1c86c5558104512818a3cf730982c222fa1f6ec679de31d363485d00675f3742af9f0fd7a630441d94c633edb192d59ed299158d27cfe1e296958451647f50fd4c758173a52f9fe1ba9b9145b095814475a7b48ac310fafaba7f55c52a2d7d2338eac055340fd933866c0ef48a3c54b006d629ba58d2637d0e1e2227194d4c71f5b0e1e01c"}, {0x38, 0x11f, 0x8, "c43058f553b699da13c4ce152ac0f3df08cf436639c77551c824a7e0dbecd795ec83d6"}], 0x330, 0x1}, 0x4040800) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600), 0x10) close(0xffffffffffffffff) 12:07:12 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0xe, 0x4, 0x4, 0x7fff}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r2, &(0x7f0000000040)="77eb"}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x101) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) 12:07:12 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00090000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:12 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b0000000000003fead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:12 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)="6d656d6f72792e6576656e7473005d14dbdc6524f12dbebeb56edfb6ecb98cd8b3e338cf70a9e3502e60da1e5774fba7385939c8ebe18bd6a2829e13e1b0bec916b376226215045c5af88f65bf2b3827", 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x0, 'io'}]}, 0xfeec) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x1f9104b5) socketpair(0x10, 0x80001, 0x1, &(0x7f0000000140)) socketpair$inet(0x2, 0xe, 0x68, &(0x7f0000000080)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={0x0, 0xffffffffffffff9c, 0x0, 0x4, &(0x7f0000000680)='GPL\x00'}, 0x30) socketpair(0xd, 0x0, 0x62, &(0x7f0000000700)) socketpair(0x2200800000001, 0x40000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x28, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000003c0)}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0x32e5e6b7fa964ed4}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 12:07:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:12 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x180000000000051c, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:12 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000070000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 434.943499] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 12:07:13 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b70000000000000095000000000000005b5faa0903b70a8ea7fd5daa9ae6a9fa69ce780f15abf4"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='\x00', r0}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) recvmsg$kcm(r2, &(0x7f0000000400)={&(0x7f0000000200)=@xdp, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)=""/57, 0x39}, {&(0x7f00000002c0)=""/181, 0xb5}], 0x2, &(0x7f00000003c0)=""/33, 0x21, 0xfffffffffffffffc}, 0x40000100) 12:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000003e0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000300000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:13 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"6e7230010100", 0x2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x842, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) ioctl$TUNATTACHFILTER(r0, 0x8927, &(0x7f0000000040)) 12:07:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x2000014e, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 435.051086] netlink: 7 bytes leftover after parsing attributes in process `syz-executor5'. 12:07:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000030000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:13 executing program 3: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x598, 0x22ff, 0x1, 0x1, 0x0, 0x7, 0x10028, 0x1, 0x1f, 0x5, 0x800, 0x6, 0xf5, 0x0, 0xcd8a, 0x6, 0x7, 0x400, 0x100, 0x8, 0x85a3, 0x1, 0x4, 0x3, 0x3, 0xbc5, 0x9, 0x8, 0x9, 0x6, 0xe79, 0x400, 0x100000000, 0x10001, 0x4, 0x2, 0x0, 0x100, 0x4, @perf_config_ext={0x55, 0xff}, 0x0, 0xce42, 0x390, 0x5, 0xffff, 0x0, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x9) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) sendmsg$kcm(r0, &(0x7f0000008e00)={&(0x7f0000007a00)=@can, 0x80, &(0x7f0000008a80)=[{&(0x7f0000007a80)="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", 0x219}], 0x1, &(0x7f0000008ac0)}, 0x0) 12:07:13 executing program 5: socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000000)) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x0, 'io'}]}, 0xfeec) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000340)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x1f9104b5) 12:07:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0x51c, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000004ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:13 executing program 4: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x2, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x600000, 0x0, 0x6e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x0, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000007c0)={r0}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xfffffffffffffffe) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0494e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x2933) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)='keyring))/vmnet0:,[\x00') write$cgroup_pid(r2, &(0x7f0000000000), 0x12) socket$kcm(0x29, 0x80000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) recvmsg$kcm(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/88, 0x58}, {&(0x7f0000000f00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/96, 0x60}], 0x3, &(0x7f0000000740)=""/40, 0x28, 0x3}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0x67, &(0x7f0000000400)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34"}, 0x30) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x8, 0x8, 0x6, 0xf0b, 0x0, 0x10000, 0x8, 0x0, 0xfffffffffffffff7, 0x9, 0x100000000, 0x7, 0x0, 0x5, 0x80, 0x8001, 0x1, 0x4, 0xa2, 0x3, 0x9, 0x80000001, 0x1ff, 0x1, 0x3, 0x1b44, 0x3ff, 0x5f0, 0x0, 0x7, 0x8000, 0x2a, 0x4, 0x4, 0x9, 0x2, 0x0, 0x4d, 0x2, @perf_config_ext={0x100, 0x4223}, 0x8000, 0x0, 0x8, 0x1, 0x6, 0xfff, 0x7ff}, r4, 0x10, r3, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f00000005c0)="901340a4c56c923a00bde0f0c884e7dce4de348ae82d2050c3ad9815a840b1ad1d470588e0541bceec8c4df8bd6ce76fc755e65f0bc1191f389ead38585fe1bf65db1d4682edbda07be008f3a4258a6888e32e49152d78597c2682ec361b26de82833a384c3e40b722ed42615a466ee481bdad3064c74968f6bad2af617b6f8e02d12a00589826aaedae440cfe9d1fb6885d9b4f5a4e731ba0bc25a335a2c6cdc617439fc4f65f4a69632b5af12cfae84bdea18a4d31d157f6015d0dca3cd8d399947e17a90e78d3f762fc", &(0x7f0000000100)=""/55}, 0x18) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000500)) 12:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000050000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x0, 0x4}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='-vboxnet1lo.\\.(\x00'}, 0x10) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21}, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x70, 0x8001, 0x0, 0x7, 0xfffffffffffffff9, 0x0, 0x6, 0x10000, 0xc, 0x2, 0x10000, 0x8, 0x6, 0x8, 0x6, 0xffffffff, 0x800, 0x10001, 0x2, 0x9, 0x9, 0x3, 0x4, 0x3ff, 0x5, 0xff, 0x7, 0x0, 0x913a, 0x7fffffff, 0xfffffffffffffe01, 0x10001, 0x1, 0x200, 0x8, 0xfff000000000, 0x2, 0x0, 0x7, 0x4, @perf_config_ext={0x7ff, 0x9}, 0x381, 0x8, 0x8, 0x3, 0xfffffffffffffffd, 0x9, 0x7}, r5, 0xa, r0, 0xa) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f00000004c0)={0x7cbb6cde97c663b, 0x70, 0x97, 0x88, 0xe0000000, 0xe4ad, 0x0, 0x1f, 0x43a8c9c04d34e0e0, 0x8, 0x3, 0xa00000000000000, 0x5, 0x4, 0x42, 0xf047, 0x4000000000, 0x3, 0x6, 0x80000001, 0x8, 0x3, 0x7fff, 0x7, 0x9, 0xef, 0x8, 0xffffffffffffff00, 0x98a, 0x7, 0x1, 0x8, 0x2, 0xfff, 0x0, 0x3ea8950, 0xe2, 0x1000, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000480), 0x4}, 0x30082, 0x5, 0x101, 0x7, 0x1, 0x7fff, 0x3fe}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x3, 0x1, 0x4, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) socket$kcm(0x11, 0xa, 0x300) r6 = socket$kcm(0xa, 0x0, 0x11) openat$cgroup_ro(r3, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000580)={'veth1\x00'}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280), 0x4) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000005c0)) sendmsg$kcm(r6, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000000)=0x9295, 0x12) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000540)={0xffffffffffffffff, &(0x7f0000000440), &(0x7f0000000280)=""/89}, 0x18) 12:07:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000000a0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:13 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000050000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00003e00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xd, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 435.706265] device nr0 entered promiscuous mode [ 435.762986] net_ratelimit: 1322 callbacks suppressed [ 435.762996] protocol 0004 is buggy, dev gre0 [ 435.774418] protocol 0004 is buggy, dev gre0 [ 435.790957] protocol 0004 is buggy, dev gre0 [ 435.793097] protocol 0004 is buggy, dev gre0 [ 435.801357] protocol 0004 is buggy, dev gre0 12:07:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe80, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 435.812925] protocol 0004 is buggy, dev gre0 [ 435.813758] protocol 0004 is buggy, dev gre0 [ 435.822792] protocol 0004 is buggy, dev gre0 [ 435.827702] protocol 0004 is buggy, dev gre0 [ 435.833328] protocol 0004 is buggy, dev gre0 12:07:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00004000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:14 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001300)={0xffffffffffffffff}) sendmsg$kcm(r0, &(0x7f0000001900)={&(0x7f0000001340)=@pptp={0x18, 0x2, {0x1, @multicast1}}, 0x80, &(0x7f0000001600)=[{&(0x7f00000013c0)="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", 0xfb}, {&(0x7f00000014c0)="ccabccda0b4e3d5d71a4655d56dce098b33ec477dfb3c7cef02d7d", 0x1b}, {&(0x7f0000001500)="369ffc979e02fd8b474d4c619a5c536e99da8cd1e8b51f6694685a6c030a3e7a0d7a4e018a9fcd47e636712a46bdae79ad4aa72b2cc5e3b406a83b890d89e3465d38a7ca54cbde77c9817691392e38ace2f961c2487a7a6ec93d578a292e5c65e9b7df863cd75102a568400c60ce1d1d85ad5d75ab28c3ff4194adbd53f6889a1d39db638a8c2abbe641887de09b0a2c3a01f3e09cca04a25e97155635ebec53f711792ea9b0eb00e754c378cec90756892b80af141bbe8b308d968fe9b43c0fc0ba39922073b05ac38060", 0xcb}], 0x3, &(0x7f0000001640)=[{0xf0, 0x107, 0x1, "0fe937cef846e60e88ce190dd6dcff79cc12d48c5930de227a33d981463acc87e8e0f1f3696803bc5aed06373e0100f29d5c6485977a6c469e66d660f8d0b81429ab8d642c307d5983bdcd054e61846d99d09511f1894cf073e36f131c638f640f56d2e0c5876acbd2161e45607000c9c84bab4600d4b828032d12f639aa2a2357ca647cec3383fda12bd7a1a21c67f78d832f91db7802b90e901936cdceca5aa1ea7b6deea95552606559abaaa9f75d842d0f02f0ac2f404b5d76289880a6fa763c1815222596d9d79d81075691da5b1b37c822e7640f4758dcec02251fcb93"}, {0x60, 0x115, 0x1, "318c79d2f5406799ba21c49d33b179b39cf6e8bfe9eb54eab9da2cd2df34204eff359eb6a98e49b7f3a65b7d4940f202272be6f7bc18d977ace0a4795c27bbddffdb5942a28b84ccc8b2ebee8481ac82"}, {0x100, 0x17, 0x200000004, "11fcdb10614a37a4eedcf9728f414f7efb817eff10718c5871a1298d382d998aae8eaf1be0f66fdda16dc7774622de46ab6bca5d0ad750b490973cd9c47ad2835fa22aaa943ca8b56aa416c5174987f1977cb8a889583cce8cf5de9b94e5b77dc689de1ac06c9b1241d85ba6b3ac57ceffaa0c85d76f8cac642d68980f7a8f759e8404407c645f1dc4f8b2a94e515e43bbd0ff444fd10b4825598f524c16c075310fbb723efc70cd398b384f2edcc8a1c5fe8f0225fbb940a92d67de1794bb4c97ed775a724b13a73a2b41580c6de9615b50f2153a81ae31a84f08fd91693593ea14a1598fa7a819c1cc6f5973"}, {0x70, 0x86, 0xad, "5e42d5a3c0906d3d93be1c46f2f8f92a01c6bca237dccd866454026c2b468e26abf1b87650d84d148e55db10eb596b452e82bd164f13bd870ff656ac7d58be926031e049de3833b2a2085f0bcaee10f51cd45430c071e9350322"}], 0x2c0, 0x40000}, 0x8000) r1 = socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xf, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x39}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1ff}, @exit]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0x87, &(0x7f0000000200)=""/135, 0x40f00, 0x1, [], 0x0, 0x7}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0x50, &(0x7f00000002c0)}, 0x10) sendmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0xa}, 0x80}, 0x0) 12:07:14 executing program 4: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ec0)={&(0x7f0000000e80)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x100, 0x0, 0x6, 0x0, 0x100000000, 0x0, 0x0, 0x1f, 0x0, 0x2, 0x6, 0x2, 0x4, 0x75, 0x0, 0xba7c, 0x0, 0x0, 0x600000, 0x0, 0x6e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4, 0x1f, 0x0, 0x2, 0x1000, 0x0, 0x0, 0xd, 0x7, @perf_bp={&(0x7f0000000280)}, 0x1, 0x7, 0x0, 0x6, 0x0, 0x2fd, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0xb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000007c0)={r0}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xfffffffffffffffe) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0494e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34", 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0xfffffe38) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x2933) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)='keyring))/vmnet0:,[\x00') write$cgroup_pid(r2, &(0x7f0000000000), 0x12) socket$kcm(0x29, 0x80000000002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400203) recvmsg$kcm(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)=""/88, 0x58}, {&(0x7f0000000f00)=""/4096, 0x1000}, {&(0x7f00000006c0)=""/96, 0x60}], 0x3, &(0x7f0000000740)=""/40, 0x28, 0x3}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0x67, &(0x7f0000000400)="2f67726f3c23fb57e6c60f1f4b45b74d999a9a8c2ce15b26e518a4cb3a9cd12dcea440d899c22c652b3a471b4a7db7f3fef6e02e2be389de133945a385bd81e9bdeeee03000000000000005b540745df4b1dee483b157624c5bc719a099e6a3509000000398c34"}, 0x30) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x8, 0x8, 0x6, 0xf0b, 0x0, 0x10000, 0x8, 0x0, 0xfffffffffffffff7, 0x9, 0x100000000, 0x7, 0x0, 0x5, 0x80, 0x8001, 0x1, 0x4, 0xa2, 0x3, 0x9, 0x80000001, 0x1ff, 0x1, 0x3, 0x1b44, 0x3ff, 0x5f0, 0x0, 0x7, 0x8000, 0x2a, 0x4, 0x4, 0x9, 0x2, 0x0, 0x4d, 0x2, @perf_config_ext={0x100, 0x4223}, 0x8000, 0x0, 0x8, 0x1, 0x6, 0xfff, 0x7ff}, r4, 0x10, r3, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f00000005c0)="901340a4c56c923a00bde0f0c884e7dce4de348ae82d2050c3ad9815a840b1ad1d470588e0541bceec8c4df8bd6ce76fc755e65f0bc1191f389ead38585fe1bf65db1d4682edbda07be008f3a4258a6888e32e49152d78597c2682ec361b26de82833a384c3e40b722ed42615a466ee481bdad3064c74968f6bad2af617b6f8e02d12a00589826aaedae440cfe9d1fb6885d9b4f5a4e731ba0bc25a335a2c6cdc617439fc4f65f4a69632b5af12cfae84bdea18a4d31d157f6015d0dca3cd8d399947e17a90e78d3f762fc", &(0x7f0000000100)=""/55}, 0x18) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000500)) 12:07:14 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000040ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000e0000000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:14 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x51c, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:14 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x7, 0x6, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:07:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b000000000e0000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:14 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000000e00ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x3, 0x6, 0x6, 0xa, 0xffffffffffffff9c, 0x9}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000300)="d754882d8f0216044828f5b61d649472d65dfc8af0afc91ed969ccc7a635d00963e9ad583a02e9747774738b9129d402409fec1563b22452643d5a494b5f0de951b49c85de90d457c1f66b3a39d6", &(0x7f0000000380)="7d0e5a62e3922e8516da349177d7e7cb094bf6b1e396b371ae185a3143d75324e8555aa7dc0b454e22e39f444e06e7368e0e172c1bc200165092afd0e32560e72ee42c3a102c46c44ac5e4f8bbc5a68582d0e688482115933f4f8bcba10f943e82ddfb7eab90a0c4101170a8038597a62d2b5140fc89689d2fe7f09aa10540a8fc578dedb7bdb1d21dde6f4c8dcb2298", 0x1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x2, 0xd9, 0x4, 0x4, r1, 0xe6}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x80000000000e, 0x4, 0x2000000000004, 0x480, 0x0, r1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000000), &(0x7f0000000140), 0x1}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f00000000c0)="cf3c1ccde651468f749a6cc08fa843ba56668d8112148013c5d182cc6b2731dccefdcd16b321e9bf58ef3c923c729ad2602b3f18b23878bd930f070920b0b176a5c41b7d69d48fcad712c44ded6b42f04985c8de984499f55238f1e724b4f2f131a5671a67234ffc743a50796a80b73a411b7023a3441d719dcbe7c67a45ad3a455efdc13028ab7f95233018815d33275f69", &(0x7f00000001c0)=""/144}, 0x18) 12:07:14 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000040000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:14 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000090000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:15 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)='securitykeyring\x00'}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='memory.events\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f00000000c0)=r3) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)={r4}) r5 = socket$kcm(0x11, 0x4, 0x0) sendmsg$kcm(r5, &(0x7f0000001540)={&(0x7f0000000240)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)="c1000f000000000067061fe4ac141414eb", 0x11}], 0x1}, 0x0) 12:07:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x51c, &(0x7f0000000140)="b90703e69ebf08bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:15 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000002c0)=""/77, 0x4d}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000001740)=@in, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000001880)=""/42, 0x2a}, 0x0) recvmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@rc, 0x80, &(0x7f00000001c0)=[{&(0x7f00000004c0)=""/247, 0xf7}, {&(0x7f00000000c0)=""/116, 0x74}], 0x2, &(0x7f0000000200)=""/10, 0xa, 0x7fff}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000040)}, 0x20) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000180)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000400)='cgroup.type\x00', 0x2, 0x0) 12:07:15 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000070000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf05bb64879e100800", &(0x7f0000000300)=""/41, 0x51c}, 0x28) 12:07:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000020000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:15 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x54}]}, &(0x7f0000000040)="47504c00571bd61e430404755f5ebb8f5d6dd7e03af28a398ced6940f8ad4ed5fec991b5ed16d48ac3739c36f1d047a01151267cc1269e023ad4563516743b3f9fa7cd31c1211fa84a", 0xfffffffffff7ffff, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0xffffffffffffffff}, 0x48) 12:07:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)="2f67726f75702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421f204dec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468be0576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff61f", 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff51, &(0x7f0000000100), 0x10000000000001d4, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYPTR, @ANYRESOCT=r0, @ANYBLOB="47d406a90d150fda19458ae35340647ea346c1ffdd5749a614dcca697072f061a0b08e70d616c6795a3bca11049a7d04f782b5afd1815380aec6fad1d61ffc75861c732d642652a7079addb2d356d3a5f1c385db02251bfe91b6e23a3481293bf969520078fa8511f3e962054be9a7dfe5d22d1398e05298e1314a20717e4eb561f661925fad744afd4074", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR64, @ANYRES32, @ANYRESDEC=r0, @ANYRES16=r0, @ANYRES16=r1, @ANYRESOCT=r1, @ANYRES16=r1, @ANYRESOCT=r0], @ANYRES64]], 0x365}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) 12:07:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000090000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8943, &(0x7f0000000040)={'gretap0\x00', @random="01003a1e2410"}) gettid() socketpair(0x10, 0xf, 0x7f, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'team0\x00', @dev={[], 0x1e}}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x428100, 0x0) 12:07:15 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000000050000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) 12:07:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000febfff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1800000000006000, 0x4c, 0x29, &(0x7f0000001240)="b90703e6681b00000e00000000ead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d80648a2ac141411e0000001e1ec65dafc924f39977d486a72146d242cfe94e2ea47dc183aea9747", &(0x7f0000000240)=""/41, 0x8}, 0x28) [ 437.899805] gretap0: refused to change device tx_queue_len [ 437.921421] gretap0: refused to change device tx_queue_len 12:07:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8943, &(0x7f0000000040)={'gretap0\x00', @random="01003a1e2410"}) gettid() socketpair(0x10, 0xf, 0x7f, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000080)={'team0\x00', @dev={[], 0x1e}}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x428100, 0x0) 12:07:15 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000009000000bfa30000000000000703000080feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)="2f02726f75702e7374617000", 0x2761, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x1800000000000006, 0xe, 0x29, &(0x7f0000000140)="b90703e69ebf08bb64879e1086dd", &(0x7f0000000300)=""/41, 0x51c}, 0x28) [ 438.086749] ================================================================== [ 438.094344] BUG: KASAN: slab-out-of-bounds in ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 438.102149] Read of size 1 at addr ffff8801b7f34747 by task syz-executor1/26038 [ 438.109589] [ 438.109618] CPU: 0 PID: 26038 Comm: syz-executor1 Not tainted 4.20.0-rc1+ #81 [ 438.118495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.118502] Call Trace: [ 438.118526] dump_stack+0x244/0x39d [ 438.118549] ? dump_stack_print_info.cold.1+0x20/0x20 [ 438.118570] ? printk+0xa7/0xcf [ 438.142556] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 438.147348] print_address_description.cold.7+0x9/0x1ff [ 438.152731] kasan_report.cold.8+0x242/0x309 [ 438.157158] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 438.162281] __asan_report_load1_noabort+0x14/0x20 [ 438.167233] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 438.172193] ip6_tnl_start_xmit+0x49f/0x25a0 [ 438.176620] ? ip6_tnl_xmit+0x3730/0x3730 [ 438.180798] ? mark_held_locks+0x130/0x130 [ 438.185047] ? lock_is_held_type+0x210/0x210 [ 438.189491] ? zap_class+0x640/0x640 [ 438.193217] ? zap_class+0x640/0x640 [ 438.196955] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.202508] ? check_preemption_disabled+0x48/0x280 [ 438.207552] ? __lock_is_held+0xb5/0x140 [ 438.211643] dev_hard_start_xmit+0x295/0xc80 [ 438.216085] ? dev_direct_xmit+0x6b0/0x6b0 [ 438.220349] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 438.225905] ? netif_skb_features+0x690/0xb70 [ 438.230410] ? rcu_softirq_qs+0x20/0x20 [ 438.234407] ? validate_xmit_xfrm+0x1ef/0xda0 [ 438.238932] ? validate_xmit_skb+0x80c/0xf30 [ 438.243366] ? netif_skb_features+0xb70/0xb70 [ 438.247877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.253430] ? check_preemption_disabled+0x48/0x280 [ 438.258458] ? check_preemption_disabled+0x48/0x280 [ 438.263495] __dev_queue_xmit+0x2f71/0x3ad0 [ 438.267833] ? save_stack+0x43/0xd0 [ 438.271473] ? kasan_kmalloc+0xc7/0xe0 [ 438.275369] ? __kmalloc_node_track_caller+0x50/0x70 [ 438.280494] ? netdev_pick_tx+0x310/0x310 [ 438.284721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.290276] ? check_preemption_disabled+0x48/0x280 [ 438.295327] ? __lock_is_held+0xb5/0x140 [ 438.299412] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 438.304439] ? skb_release_data+0x1c4/0x880 [ 438.308776] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 438.314075] ? kasan_unpoison_shadow+0x35/0x50 [ 438.318670] ? skb_tx_error+0x2f0/0x2f0 [ 438.322665] ? __kmalloc_node_track_caller+0x50/0x70 [ 438.327782] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.327802] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 438.327823] ? kasan_check_write+0x14/0x20 [ 438.327840] ? pskb_expand_head+0x6b3/0x10f0 [ 438.327869] ? skb_release_data+0x880/0x880 [ 438.338924] ? __alloc_skb+0x770/0x770 [ 438.338953] ? __lock_is_held+0xb5/0x140 [ 438.338979] ? kasan_check_write+0x14/0x20 [ 438.338994] ? __skb_clone+0x6c7/0xa00 [ 438.339013] ? __copy_skb_header+0x6b0/0x6b0 [ 438.372339] ? kmem_cache_alloc+0x33a/0x730 [ 438.376658] ? skb_ensure_writable+0x15e/0x640 [ 438.381235] dev_queue_xmit+0x17/0x20 [ 438.385021] ? dev_queue_xmit+0x17/0x20 [ 438.388981] __bpf_redirect+0x5cf/0xb20 [ 438.392946] bpf_clone_redirect+0x2f6/0x490 [ 438.397268] bpf_prog_13013319041fa45f+0xb29/0x1000 [ 438.402277] ? __sched_text_start+0x8/0x8 [ 438.406412] ? lock_downgrade+0x900/0x900 [ 438.410570] ? find_held_lock+0x36/0x1c0 [ 438.414631] ? lock_acquire+0x1ed/0x520 [ 438.418591] ? bpf_test_run+0x3cb/0x780 [ 438.422555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.428084] ? check_preemption_disabled+0x48/0x280 [ 438.433091] ? kasan_check_read+0x11/0x20 [ 438.437246] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 438.442523] ? rcu_softirq_qs+0x20/0x20 [ 438.446486] ? preempt_schedule+0x4d/0x60 [ 438.450626] ? ___preempt_schedule+0x16/0x18 [ 438.455029] ? bpf_test_run+0x25d/0x780 [ 438.459005] ? netlink_diag_dump+0x2a0/0x2a0 [ 438.463404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.468930] ? bpf_test_init.isra.10+0x70/0x100 [ 438.473589] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 438.478343] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 438.483180] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 438.488720] ? fput+0x130/0x1a0 [ 438.492003] ? __bpf_prog_get+0x9b/0x290 [ 438.496069] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 438.500912] ? bpf_prog_test_run+0x130/0x1a0 [ 438.505313] ? __x64_sys_bpf+0x3d8/0x520 [ 438.509372] ? bpf_prog_get+0x20/0x20 [ 438.513189] ? do_syscall_64+0x1b9/0x820 [ 438.517245] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 438.522608] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.527523] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.532369] ? trace_hardirqs_on_caller+0x310/0x310 [ 438.537404] ? prepare_exit_to_usermode+0x291/0x3b0 [ 438.542442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.547288] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.552644] [ 438.554254] Allocated by task 26038: [ 438.557955] save_stack+0x43/0xd0 [ 438.561406] kasan_kmalloc+0xc7/0xe0 [ 438.565117] __kmalloc_node_track_caller+0x50/0x70 [ 438.570033] __kmalloc_reserve.isra.40+0x41/0xe0 [ 438.574781] pskb_expand_head+0x230/0x10f0 [ 438.579006] skb_ensure_writable+0x3dd/0x640 [ 438.583397] bpf_clone_redirect+0x14a/0x490 [ 438.587712] bpf_prog_13013319041fa45f+0xb29/0x1000 [ 438.592805] [ 438.594423] Freed by task 25052: [ 438.597779] save_stack+0x43/0xd0 [ 438.601220] __kasan_slab_free+0x102/0x150 [ 438.605440] kasan_slab_free+0xe/0x10 [ 438.609225] kfree+0xcf/0x230 [ 438.612331] load_elf_binary+0x25b4/0x5620 [ 438.616572] search_binary_handler+0x17d/0x570 [ 438.621157] __do_execve_file.isra.33+0x1661/0x25d0 [ 438.626170] __x64_sys_execve+0x8f/0xc0 [ 438.630143] do_syscall_64+0x1b9/0x820 [ 438.634029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.639201] [ 438.640819] The buggy address belongs to the object at ffff8801b7f34540 [ 438.640819] which belongs to the cache kmalloc-512 of size 512 [ 438.653475] The buggy address is located 7 bytes to the right of [ 438.653475] 512-byte region [ffff8801b7f34540, ffff8801b7f34740) [ 438.665679] The buggy address belongs to the page: [ 438.670594] page:ffffea0006dfcd00 count:1 mapcount:0 mapping:ffff8801da800940 index:0x0 [ 438.678721] flags: 0x2fffc0000000200(slab) [ 438.682945] raw: 02fffc0000000200 ffffea00072f1988 ffffea0006f1d9c8 ffff8801da800940 [ 438.690813] raw: 0000000000000000 ffff8801b7f34040 0000000100000006 0000000000000000 [ 438.698696] page dumped because: kasan: bad access detected [ 438.704387] [ 438.705994] Memory state around the buggy address: [ 438.710908] ffff8801b7f34600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 438.718452] ffff8801b7f34680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 438.725793] >ffff8801b7f34700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 438.733131] ^ [ 438.738566] ffff8801b7f34780: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 438.745933] ffff8801b7f34800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 438.753278] ================================================================== [ 438.760617] Disabling lock debugging due to kernel taint [ 438.766203] Kernel panic - not syncing: panic_on_warn set ... [ 438.772109] CPU: 0 PID: 26038 Comm: syz-executor1 Tainted: G B 4.20.0-rc1+ #81 [ 438.780809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.790165] Call Trace: [ 438.792745] dump_stack+0x244/0x39d [ 438.796373] ? dump_stack_print_info.cold.1+0x20/0x20 [ 438.801564] panic+0x2ad/0x55c [ 438.804755] ? add_taint.cold.5+0x16/0x16 [ 438.808895] ? trace_hardirqs_on+0xb4/0x310 [ 438.813204] kasan_end_report+0x47/0x4f [ 438.817165] kasan_report.cold.8+0x76/0x309 [ 438.821478] ? ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 438.826594] __asan_report_load1_noabort+0x14/0x20 [ 438.831526] ip6_tnl_parse_tlv_enc_lim+0x5df/0x660 [ 438.836453] ip6_tnl_start_xmit+0x49f/0x25a0 [ 438.840850] ? ip6_tnl_xmit+0x3730/0x3730 [ 438.845005] ? mark_held_locks+0x130/0x130 [ 438.849241] ? lock_is_held_type+0x210/0x210 [ 438.853646] ? zap_class+0x640/0x640 [ 438.857354] ? zap_class+0x640/0x640 [ 438.861065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.866593] ? check_preemption_disabled+0x48/0x280 [ 438.871614] ? __lock_is_held+0xb5/0x140 [ 438.875686] dev_hard_start_xmit+0x295/0xc80 [ 438.880089] ? dev_direct_xmit+0x6b0/0x6b0 [ 438.884351] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 438.889900] ? netif_skb_features+0x690/0xb70 [ 438.894404] ? rcu_softirq_qs+0x20/0x20 [ 438.898389] ? validate_xmit_xfrm+0x1ef/0xda0 [ 438.902904] ? validate_xmit_skb+0x80c/0xf30 [ 438.907336] ? netif_skb_features+0xb70/0xb70 [ 438.911841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.917391] ? check_preemption_disabled+0x48/0x280 [ 438.922412] ? check_preemption_disabled+0x48/0x280 [ 438.927437] __dev_queue_xmit+0x2f71/0x3ad0 [ 438.931769] ? save_stack+0x43/0xd0 [ 438.935399] ? kasan_kmalloc+0xc7/0xe0 [ 438.939288] ? __kmalloc_node_track_caller+0x50/0x70 [ 438.944405] ? netdev_pick_tx+0x310/0x310 [ 438.948562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.954111] ? check_preemption_disabled+0x48/0x280 [ 438.959150] ? __lock_is_held+0xb5/0x140 [ 438.963221] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 438.968240] ? skb_release_data+0x1c4/0x880 [ 438.972568] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 438.977849] ? kasan_unpoison_shadow+0x35/0x50 [ 438.982435] ? skb_tx_error+0x2f0/0x2f0 [ 438.986417] ? __kmalloc_node_track_caller+0x50/0x70 [ 438.991527] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 438.997079] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 439.002629] ? kasan_check_write+0x14/0x20 [ 439.006872] ? pskb_expand_head+0x6b3/0x10f0 [ 439.011301] ? skb_release_data+0x880/0x880 [ 439.015632] ? __alloc_skb+0x770/0x770 [ 439.019534] ? __lock_is_held+0xb5/0x140 [ 439.023609] ? kasan_check_write+0x14/0x20 [ 439.027850] ? __skb_clone+0x6c7/0xa00 [ 439.031743] ? __copy_skb_header+0x6b0/0x6b0 [ 439.036167] ? kmem_cache_alloc+0x33a/0x730 [ 439.040509] ? skb_ensure_writable+0x15e/0x640 [ 439.045107] dev_queue_xmit+0x17/0x20 [ 439.048913] ? dev_queue_xmit+0x17/0x20 [ 439.052896] __bpf_redirect+0x5cf/0xb20 [ 439.056881] bpf_clone_redirect+0x2f6/0x490 [ 439.061220] bpf_prog_13013319041fa45f+0xb29/0x1000 [ 439.066245] ? __sched_text_start+0x8/0x8 [ 439.070403] ? lock_downgrade+0x900/0x900 [ 439.074563] ? find_held_lock+0x36/0x1c0 [ 439.078635] ? lock_acquire+0x1ed/0x520 [ 439.082609] ? bpf_test_run+0x3cb/0x780 [ 439.086590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.092143] ? check_preemption_disabled+0x48/0x280 [ 439.097168] ? kasan_check_read+0x11/0x20 [ 439.101319] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 439.106600] ? rcu_softirq_qs+0x20/0x20 [ 439.110579] ? preempt_schedule+0x4d/0x60 [ 439.114729] ? ___preempt_schedule+0x16/0x18 [ 439.119150] ? bpf_test_run+0x25d/0x780 [ 439.123137] ? netlink_diag_dump+0x2a0/0x2a0 [ 439.127557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 439.133097] ? bpf_test_init.isra.10+0x70/0x100 [ 439.137770] ? bpf_prog_test_run_skb+0x73b/0xcb0 [ 439.142539] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 439.147386] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 439.152928] ? fput+0x130/0x1a0 [ 439.156208] ? __bpf_prog_get+0x9b/0x290 [ 439.160281] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 439.165125] ? bpf_prog_test_run+0x130/0x1a0 [ 439.169540] ? __x64_sys_bpf+0x3d8/0x520 [ 439.173609] ? bpf_prog_get+0x20/0x20 [ 439.177433] ? do_syscall_64+0x1b9/0x820 [ 439.181494] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 439.186865] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.191793] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.196639] ? trace_hardirqs_on_caller+0x310/0x310 [ 439.201660] ? prepare_exit_to_usermode+0x291/0x3b0 [ 439.206683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.211535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.218000] Kernel Offset: disabled [ 439.221649] Rebooting in 86400 seconds..